[go: up one dir, main page]

CN113315786B - Security authentication method and system - Google Patents

Security authentication method and system Download PDF

Info

Publication number
CN113315786B
CN113315786B CN202110711530.7A CN202110711530A CN113315786B CN 113315786 B CN113315786 B CN 113315786B CN 202110711530 A CN202110711530 A CN 202110711530A CN 113315786 B CN113315786 B CN 113315786B
Authority
CN
China
Prior art keywords
authentication
unit
information
module
security
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110711530.7A
Other languages
Chinese (zh)
Other versions
CN113315786A (en
Inventor
闫志刚
路适远
景天岭
王瑞胤
高于喆
李帅康
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhengzhou Xinyuan Information Technology Co ltd
Original Assignee
Zhengzhou Xinyuan Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhengzhou Xinyuan Information Technology Co ltd filed Critical Zhengzhou Xinyuan Information Technology Co ltd
Priority to CN202110711530.7A priority Critical patent/CN113315786B/en
Publication of CN113315786A publication Critical patent/CN113315786A/en
Application granted granted Critical
Publication of CN113315786B publication Critical patent/CN113315786B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0884Network architectures or network communication protocols for network security for authentication of entities by delegation of authentication, e.g. a proxy authenticates an entity to be authenticated on behalf of this entity vis-à-vis an authentication entity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/126Applying verification of the received information the source of the received data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S40/00Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
    • Y04S40/20Information technology specific aspects, e.g. CAD, simulation, modelling, system security

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The invention relates to the technical field of security authentication, in particular to a security authentication method and a system, comprising an authentication center, a server terminal, an information management library, a login module, an authentication mode authentication module, a security assurance authentication module, an external module and a service module, wherein the login module consists of a touch display unit, a registration unit and a protocol unit, the security assurance authentication module consists of an authentication unit and a backtracking unit, and the security assurance authentication module consists of an information identification unit and an authentication unit, and comprises the following steps: s1: logging in; s2: identifying an authentication mode; s3: safety guarantee authentication; s4: and (5) business processing. By arranging the detection unit, the third party authentication system can be detected when the third party authentication system is accessed, so that the problem of the authentication process caused by the problem of the third party authentication system is avoided, the leakage of user information is caused, and the information security of the whole authentication process is greatly improved.

Description

Security authentication method and system
Technical Field
The present invention relates to the field of security authentication technologies, and in particular, to a security authentication method and system.
Background
With the rapid development of electronic information in China, the electronic network technology is popular in China and becomes an important component of daily life of people, and when people provide convenience for life in the electronic network, security authentication is an essential step, and the security authentication is important because of the relation of private information of each person.
In the prior art, when authentication is performed, account passwords, short messages, mailboxes and other factors are adopted for identification authentication in most cases, meanwhile, in the authentication process, a third party system is sometimes required to be accessed for authentication, but when the third party system is accessed, identification detection is not performed on the third party system, if the third party system has problems, leakage of user information is easily caused, and the security of the whole authentication system is reduced.
Disclosure of Invention
The invention aims to solve the defects in the prior art and provides a safety authentication method and a safety authentication system.
In order to achieve the above purpose, the present invention adopts the following technical scheme: the security authentication system comprises an authentication center, a server terminal, an information management library, a login module, an authentication mode authentication module, a security guarantee authentication module, an external module and a service module, wherein the login module consists of a touch display unit, a registration unit and a protocol unit, the security guarantee authentication module consists of an authentication unit and a backtracking unit, and the security guarantee authentication module consists of an information identification unit and an authentication unit.
A security authentication method comprising the steps of:
s1: and (3) login: firstly, a user opens a login module, clicks a protocol unit, clicks and confirms after carefully reading, if the registration is not completed, the user can click a registration unit to register information, after the information registration is completed, the information is encrypted and uploaded to an information management library to be stored, if the registration is completed, the user clicks a touch display unit to input corresponding identity information, and the next step is entered;
s2: identification of an authentication mode: the information recorded in the S1 is transmitted to an authentication mode authentication module, and after authentication of an authentication unit is completed, the next step is carried out; if the session is overtime, the backtracking unit receives the signal, and then the authentication mode identification module automatically identifies the early session authentication mode and automatically jumps to the authentication system corresponding to the authentication mode;
s3: and (3) safety guarantee authentication: after the authentication in the S2 authentication mode is completed, an authentication unit in the security assurance authentication module receives the signal and is connected with the authentication center, then the signal is sent to an information recognition unit, the information recognition unit compares the input information in the S1 with the information stored in the information management library, and if the information is correct, the next step is carried out; if the information identification is wrong or can not be identified, returning to the login module;
s4: and (3) business processing: and S4, after the information authentication is correct, the corresponding service module is correspondingly entered for service processing, and service processing information is transmitted to the server terminal.
In order to facilitate the access of the third party authentication system, the invention is improved in that the external module is provided with an external interface, and the external module is expanded to access the third party authentication system through the external interface.
In order to ensure the standardization of the third party authentication system, the invention is improved in that the external module further comprises a detection unit, the detection unit can detect the access to the third party authentication system, can identify the access to the third party authentication system after confirming that the third party authentication system is correct, uploads and stores information to the server terminal, and if the third party authentication system has a loophole, signals are sent to the server terminal to force the third party authentication system to be powered off.
In order to improve the diversity of authentication modes, the invention is improved in that the touch display unit comprises an account password, a short message, a mailbox and a random code multi-factor login interface.
In order to improve the confidentiality of information storage, the invention improves that the login module in S1 also comprises an encryption unit and an uploading unit, wherein the encryption unit encrypts the registration information and transmits the registration information to the information management library for storage through the uploading unit.
In order to improve the flexibility of the system, the login module further comprises a modification unit, and the modification unit can change information.
In order to improve the backup effect of the service processing file, the invention improves that the service module in S4 comprises a service processing unit and a feedback unit, and after the service processing unit finishes processing, service processing information is fed back to the server terminal through the feedback unit.
In order to improve the safety effect of the system authentication, the invention improves that the safety guarantee authentication module in the S3 further comprises a machine locking unit, and if the number of times of verification failure exceeds 3 times, the machine locking unit can forcedly take the system off the machine.
In order to improve the autonomous reaction effect of the system, the invention improves that the safety guarantee authentication module in S3 also comprises a warning unit, and if repeated errors occur in information output in the process of information auditing, the warning unit can sort the error information, upload the error information to the server terminal and send out an alarm.
Compared with the prior art, the invention has the advantages and positive effects that:
1. according to the invention, by arranging the detection unit, the third party authentication system can be detected when the third party authentication system is accessed, so that the problem of the authentication process caused by the problem of the third party authentication system is avoided, the leakage of user information is caused, and the information security of the whole authentication process is greatly improved.
2. According to the invention, by arranging the machine locking unit and the warning unit, when a problem occurs in the authentication process, the whole system can be forced to be powered off and an alarm can be sent to the server terminal in time, so that background staff can process the information in time, and the information security of the whole system is further improved.
Drawings
Fig. 1 is a schematic flow chart of a security authentication method and system according to the present invention.
Detailed Description
The present invention will be described in further detail with reference to the drawings and examples, in order to make the objects, technical solutions and advantages of the present invention more apparent. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the invention.
In the description of the present invention, it should be understood that the terms "length," "width," "upper," "lower," "front," "rear," "left," "right," "vertical," "horizontal," "top," "bottom," "inner," "outer," and the like indicate orientations or positional relationships based on the orientation or positional relationships shown in the drawings, merely to facilitate describing the present invention and simplify the description, and do not indicate or imply that the devices or elements referred to must have a specific orientation, be configured and operated in a specific orientation, and therefore should not be construed as limiting the present invention. Furthermore, in the description of the present invention, the meaning of "a plurality" is two or more, unless explicitly defined otherwise.
Referring to fig. 1, the present invention provides a technical solution: the security authentication system comprises an authentication center, a server terminal, an information management library, a login module, an authentication mode authentication module, a security guarantee authentication module, an external module and a service module, wherein the login module consists of a touch display unit, a registration unit and a protocol unit, the security guarantee authentication module consists of an authentication unit and a backtracking unit, and the security guarantee authentication module consists of an information identification unit and an authentication unit.
A security authentication method comprising the steps of:
s1: and (3) login: firstly, a user opens a login module, clicks a protocol unit, clicks and confirms after carefully reading, if the registration is not completed, the user can click a registration unit to register information, after the information registration is completed, the information is encrypted and uploaded to an information management library to be stored, if the registration is completed, the user clicks a touch display unit to input corresponding identity information, and the next step is entered;
s2: identification of an authentication mode: the information recorded in the S1 is transmitted to an authentication mode authentication module, and after authentication of an authentication unit is completed, the next step is carried out; if the session is overtime, the backtracking unit receives the signal, and then the authentication mode identification module automatically identifies the early session authentication mode and automatically jumps to the authentication system corresponding to the authentication mode;
s3: and (3) safety guarantee authentication: after the authentication in the S2 authentication mode is completed, an authentication unit in the security assurance authentication module receives the signal and is connected with the authentication center, then the signal is sent to an information recognition unit, the information recognition unit compares the input information in the S1 with the information stored in the information management library, and if the information is correct, the next step is carried out; if the information identification is wrong or can not be identified, returning to the login module;
s4: and (3) business processing: and S4, after the information authentication is correct, the corresponding service module is correspondingly entered for service processing, and service processing information is transmitted to the server terminal.
In this embodiment, the external connection module is provided with an external connection interface, and the external connection module is connected to the third party authentication system through the external connection interface in an expansion manner, so that when the authentication system needs to be connected to the third party authentication system, the data line can be directly inserted into the external connection interface, the operation is simple and quick, and the quick connection of the third party authentication system can be realized.
In this embodiment, the external module further includes a detection unit, the detection unit may detect the access to the third party authentication system, identify the third party authentication system after confirming that the third party authentication system is error-free, upload and store information to the server terminal, if a leak exists in the third party authentication system, send a signal to the server terminal, force the third party authentication system to be powered off, after the third party authentication system is accessed through the external interface, scan the detection unit first, the detection unit will check the third party authentication system, ensure that the third party authentication system can be authenticated after error-free, and further improve the security of the whole system if a problem occurs.
In this embodiment, the touch display unit includes an account password, a short message, a mailbox, and a random code multi-factor login interface, and multiple login modes including the account password, the short message, the mailbox, the random code and the like are arranged in the touch display unit, so that flexibility of the whole authentication system is greatly improved, and a use range of the whole authentication system is widened.
In this embodiment, the login module in S1 further includes an encryption unit and an uploading unit, where the encryption unit encrypts the registration information and transmits the registration information to the information management library for storage through the uploading unit, and when the new user completes registration, the encryption unit encrypts the identity information of the user and outputs the encrypted identity information to the uploading unit, and the encrypted identity information is transmitted to the information management library through the uploading unit, so that a layer of guarantee can be provided for the user information additionally, and easy leakage of the user information is avoided.
In this embodiment, the login module further includes a modification unit, the modification unit may change information, and the modification unit disposed inside the login module is directly connected to the information management library and the server terminal through the internet unit, so that a user can modify personal information simply and quickly.
In this embodiment, the service module in S4 includes a service processing unit and a feedback unit, after the service processing unit processes the service, the service processing information is fed back to the server terminal through the feedback unit, and when the user service is processed, the service processing unit directly sends a signal to the feedback unit, and then the feedback unit feeds back the service processing information to the server terminal, so as to perform backup in time.
In this embodiment, the security protection authentication module in S3 further includes a machine locking unit, if the number of times of verification failure exceeds 3 times, the machine locking unit will force the system to be powered off, and when the number of times of verification failure exceeds 3 times, the machine locking unit in the security protection authentication module will respond in time at this time, and judge that the user information leaks, force the system to be powered off, so as to ensure the security of the user information.
In this embodiment, the security authentication module in S3 further includes a warning unit, if in the process of information auditing, if the information output has repeated errors, the warning unit will sort the error information, upload to the server terminal and send out an alarm, and when the user information has repeated input errors, the warning unit will timely feed back the user information to the server terminal and remind, so as to ensure that the staff can respond timely.
Working principle: firstly, a user opens a login module, clicks a protocol unit, clicks a carefully read and then confirms a single click, the protocol unit confirms that the next step can be carried out, the user who does not finish registration can click the registration unit to register information, after the information registration is finished, the system encrypts the information and uploads the information to an information management library to store the information, the registered user can click a touch display unit, the user can select a corresponding login mode and input corresponding identity information according to own information, enter the next step after confirmation, then the information can be transmitted to an authentication mode identification module, the authentication unit can judge a specific authentication mode according to the input information, enter the next step after authentication is finished, if the authentication process is overtime, a backtracking unit in the authentication mode identification module can receive signals and dynamically identify a previous session authentication mode, meanwhile, the authentication system of the corresponding authentication mode is automatically jumped to, the authentication unit in the security guarantee authentication module receives the signal and is connected with the authentication center, then the signal is sent to the information recognition unit, the information recognition unit compares the login information with the information stored in the information management library, if the information is correct, the next step is carried out, if the third party authentication system is required to be accessed, the connection can be directly carried out through an external interface, after the connection is completed, the detection unit receives the signal to detect the third party authentication system, the authentication can be carried out after confirming that the third party authentication system is correct, the information is uploaded and stored in the server terminal, if the third party authentication system has a leak, the signal is sent to the server terminal, the third party authentication system is forced to be started down, so that the problem of the authentication process caused by the problem of the third party authentication system is avoided, the leakage of the user information is caused, and feedback is carried out to the server terminal; if the information identification is wrong or can not be identified, the login module is directly returned, if the number of times of verification failure exceeds 3, the machine locking unit can force the system to be started down, meanwhile, in the information verification process, the information output is repeated in error, the warning unit can sort error information and upload the error information to the server terminal to send out an alarm, a background worker can conveniently respond in time, after S4 information authentication is correct, the corresponding business module can be correspondingly entered into for business processing, business processing information is transmitted to the server terminal, and through setting the system, the safety of the whole authentication process can be effectively improved, and leakage of user information is avoided.
The present invention is not limited to the above embodiments, and any equivalent embodiments which can be changed or modified by the technical disclosure described above can be applied to other fields, but any simple modification, equivalent changes and modification made to the above embodiments according to the technical matter of the present invention will still fall within the scope of the technical disclosure.

Claims (8)

1. The safety authentication system comprises an authentication center, a server terminal, an information management library, a login module, an authentication mode authentication module, a safety guarantee authentication module, an external module and a service module, and is characterized in that: the login module consists of a touch display unit, a registration unit and a protocol unit, the security guarantee authentication module consists of an authentication unit and a backtracking unit, and the security guarantee authentication module consists of an information identification unit and an authentication unit;
the external module is provided with an external interface, and is connected with a third party authentication system through the external interface extension;
the external module further comprises a detection unit, the detection unit can detect the access to the third party authentication system, the identification can be carried out after the third party authentication system is confirmed to be correct, the information is uploaded and stored in the server terminal, and if the third party authentication system has a loophole, a signal is sent to the server terminal to force the third party authentication system to be powered off.
2. A security authentication system according to claim 1, wherein: the touch display unit comprises an account password, a short message, a mailbox and a random code multi-factor login interface.
3. A security authentication method, characterized in that: the method comprises the following steps:
s1: and (3) login: firstly, a user opens a login module, clicks a protocol unit, clicks and confirms after carefully reading, if the registration is not completed, the user can click a registration unit to register information, after the information registration is completed, the information is encrypted and uploaded to an information management library to be stored, if the registration is completed, the user clicks a touch display unit to input corresponding identity information, and the next step is entered;
s2: identification of an authentication mode: the information recorded in the S1 is transmitted to an authentication mode authentication module, and after authentication of an authentication unit is completed, the next step is carried out; if the session is overtime, the backtracking unit receives the signal, and then the authentication mode identification module automatically identifies the early session authentication mode and automatically jumps to the authentication system corresponding to the authentication mode;
s3: and (3) safety guarantee authentication: after the authentication in the S2 authentication mode is completed, an authentication unit in the security assurance authentication module receives the signal and is connected with the authentication center, then the signal is sent to an information recognition unit, the information recognition unit compares the input information in the S1 with the information stored in the information management library, and if the information is correct, the next step is carried out; if the information identification is wrong or can not be identified, returning to the login module;
s4: and (3) business processing: and S3, after the information authentication is correct, the corresponding service module is correspondingly entered for service processing, and service processing information is transmitted to the server terminal.
4. A security authentication method according to claim 3, characterized in that: the login module in S1 also comprises an encryption unit and an uploading unit, wherein the encryption unit encrypts the registration information and transmits the registration information to the information management library for storage through the uploading unit.
5. A security authentication method according to claim 3, characterized in that: the login module also comprises a modification unit, and the modification unit can change information.
6. A security authentication method according to claim 3, characterized in that: and the service module in S4 comprises a service processing unit and a feedback unit, and after the service processing unit finishes processing, service processing information is fed back to the server terminal through the feedback unit.
7. A security authentication method according to claim 3, characterized in that: and S3, the security assurance authentication module further comprises a machine locking unit, and if the number of times of verification failure exceeds 3, the machine locking unit can forcedly take the system off the machine.
8. A security authentication method according to claim 3, characterized in that: and S3, the safety guarantee authentication module further comprises a warning unit, and if repeated errors occur in information output in the information auditing process, the warning unit can sort error information, upload the error information to the server terminal and send out an alarm.
CN202110711530.7A 2021-06-25 2021-06-25 Security authentication method and system Active CN113315786B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110711530.7A CN113315786B (en) 2021-06-25 2021-06-25 Security authentication method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110711530.7A CN113315786B (en) 2021-06-25 2021-06-25 Security authentication method and system

Publications (2)

Publication Number Publication Date
CN113315786A CN113315786A (en) 2021-08-27
CN113315786B true CN113315786B (en) 2023-05-26

Family

ID=77380296

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110711530.7A Active CN113315786B (en) 2021-06-25 2021-06-25 Security authentication method and system

Country Status (1)

Country Link
CN (1) CN113315786B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20160062516A (en) * 2014-11-25 2016-06-02 한국수력원자력 주식회사 System and method for tracking plant trip cause using data link between plant gateway system and single point vulnerability monitor in CANDU Type NPPs
CN111158350A (en) * 2020-01-16 2020-05-15 斯润天朗(北京)科技有限公司 Diagnosis-based quality monitoring platform and system
CN112257007A (en) * 2020-12-18 2021-01-22 垒途智能教科技术研究院江苏有限公司 Enterprise financial information management system
CN112671700A (en) * 2020-10-22 2021-04-16 垒途智能教科技术研究院江苏有限公司 Enterprise economic management information safety system

Family Cites Families (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7610341B2 (en) * 2003-10-14 2009-10-27 At&T Intellectual Property I, L.P. Filtered email differentiation
US7886343B2 (en) * 2006-04-07 2011-02-08 Dell Products L.P. Authentication service for facilitating access to services
DK2693362T3 (en) * 2012-07-31 2015-07-27 Sick Ag Detection system for mounting on a conveyor belt
KR101308210B1 (en) * 2012-09-04 2013-09-13 이예행 Classification system of e-mail by personalization with automatically and operating method thereof
WO2016097757A1 (en) * 2014-12-18 2016-06-23 Sophos Limited A method and system for network access control based on traffic monitoring and vulnerability detection using process related information
CN105354507B (en) * 2015-10-23 2018-09-11 浙江远望软件有限公司 A kind of data safety time slot scrambling under cloud environment
CN106296112A (en) * 2016-07-28 2017-01-04 广州猫眼网络科技有限公司 Attendance checking system based on recognition of face, method and device thereof
CN108108156A (en) * 2016-11-23 2018-06-01 上海冰穹网络科技有限公司 SDK Subscriber Management Systems and method
CN107196943B (en) * 2017-05-26 2019-09-20 浙江大学 A method for implementing secure display of private data on a third-party platform
CN108985075A (en) * 2017-06-02 2018-12-11 成都小娱网络科技有限公司 A kind of image file disk encryption system and method for lightweight
CN107493378B (en) * 2017-08-07 2020-05-26 Oppo广东移动通信有限公司 Method and apparatus for application program login, computer device and readable storage medium
CN107959680B (en) * 2017-11-30 2020-05-12 哈尔滨森美朴科技发展有限责任公司 Password-free registration login method and system
CN109120584B (en) * 2018-06-19 2020-07-24 上海交通大学 Terminal security protection method and system based on UEFI and WinPE
US10936725B2 (en) * 2018-10-17 2021-03-02 Accenture Global Solutions Limited Container image vulnerability reduction
CN110708335A (en) * 2019-10-29 2020-01-17 深圳市融壹买信息科技有限公司 Access authentication method and device and terminal equipment
CN111245799B (en) * 2020-01-02 2022-01-11 腾讯科技(深圳)有限公司 Information monitoring method and device and readable storage medium
CN112512046B (en) * 2020-12-16 2023-03-24 南京理工大学 Safety detection method for short message verification code authentication process of Android application program

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20160062516A (en) * 2014-11-25 2016-06-02 한국수력원자력 주식회사 System and method for tracking plant trip cause using data link between plant gateway system and single point vulnerability monitor in CANDU Type NPPs
CN111158350A (en) * 2020-01-16 2020-05-15 斯润天朗(北京)科技有限公司 Diagnosis-based quality monitoring platform and system
CN112671700A (en) * 2020-10-22 2021-04-16 垒途智能教科技术研究院江苏有限公司 Enterprise economic management information safety system
CN112257007A (en) * 2020-12-18 2021-01-22 垒途智能教科技术研究院江苏有限公司 Enterprise financial information management system

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
An Evaluation of Chromium OS:the Next Generation Operating System;Meng Wang;Rich Wolski;;计算机教育(第05期);全文 *
基于负荷管理系统的数据传输安全模式探讨;阴存贞;刘琰;黄研利;于春菊;杨文宇;;陕西电力(第06期);全文 *

Also Published As

Publication number Publication date
CN113315786A (en) 2021-08-27

Similar Documents

Publication Publication Date Title
CN103728894B (en) The long-range control method of a kind of terminal unit and system
CN104134253B (en) A kind of gate control system and gate inhibition's deployment method
CN101002212B (en) Method and system for compound authentication registration control
EP3712861A1 (en) Information prompting method, apparatus, and system, and intelligent electronic door lock
EP2803045B1 (en) Method and system for certifying the presence of an operator
US11341223B1 (en) Wearable computing device secure access badge
CN102164113A (en) Face recognition login method and system
US11727360B2 (en) Method and system for reporting and monitoring location-related activities of mobile devices
CN103873446A (en) Method for logging in system
CN106170793A (en) System, method and apparatus for secure log
CN112734989B (en) Bluetooth key distribution method for intelligent door lock
CN105844737A (en) Camera based electronic lock system and use method
CN102695170A (en) Mobile platform possessing identity authentication function and identity authentication method
US20220171839A1 (en) Wearable computing device for automatic user validation
CN113315786B (en) Security authentication method and system
CN116702110A (en) Method, device, equipment and storage medium for sharing big data of supply chain
CN112039664B (en) Data communication method and system suitable for intelligent ammeter
JP2005092407A (en) Method, system, and program for managing attending and leaving office
CN106033509A (en) Method and system for computer room inspection
CN116471076A (en) Authentication login method and device for shared account
CN108768993A (en) The method and apparatus that associated terminal logs in
TR201702782A2 (en) One-time password message transmission.
US12141255B2 (en) Method for authenticating a user on client equipment
CN108053507A (en) A kind of management method of checking card based on cloud lock, system
CN106385421A (en) Signing and approving initiating user management method and equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant