CN113315786B - Security authentication method and system - Google Patents
Security authentication method and system Download PDFInfo
- Publication number
- CN113315786B CN113315786B CN202110711530.7A CN202110711530A CN113315786B CN 113315786 B CN113315786 B CN 113315786B CN 202110711530 A CN202110711530 A CN 202110711530A CN 113315786 B CN113315786 B CN 113315786B
- Authority
- CN
- China
- Prior art keywords
- authentication
- unit
- information
- module
- security
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 29
- 238000012545 processing Methods 0.000 claims abstract description 26
- 238000001514 detection method Methods 0.000 claims abstract description 12
- 238000012986 modification Methods 0.000 claims description 9
- 230000004048 modification Effects 0.000 claims description 9
- 238000012795 verification Methods 0.000 claims description 6
- 238000007726 management method Methods 0.000 description 12
- 230000000694 effects Effects 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 2
- 238000012790 confirmation Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000008092 positive effect Effects 0.000 description 1
- 238000004148 unit process Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0884—Network architectures or network communication protocols for network security for authentication of entities by delegation of authentication, e.g. a proxy authenticates an entity to be authenticated on behalf of this entity vis-à-vis an authentication entity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/126—Applying verification of the received information the source of the received data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y04—INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
- Y04S—SYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
- Y04S40/00—Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
- Y04S40/20—Information technology specific aspects, e.g. CAD, simulation, modelling, system security
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
The invention relates to the technical field of security authentication, in particular to a security authentication method and a system, comprising an authentication center, a server terminal, an information management library, a login module, an authentication mode authentication module, a security assurance authentication module, an external module and a service module, wherein the login module consists of a touch display unit, a registration unit and a protocol unit, the security assurance authentication module consists of an authentication unit and a backtracking unit, and the security assurance authentication module consists of an information identification unit and an authentication unit, and comprises the following steps: s1: logging in; s2: identifying an authentication mode; s3: safety guarantee authentication; s4: and (5) business processing. By arranging the detection unit, the third party authentication system can be detected when the third party authentication system is accessed, so that the problem of the authentication process caused by the problem of the third party authentication system is avoided, the leakage of user information is caused, and the information security of the whole authentication process is greatly improved.
Description
Technical Field
The present invention relates to the field of security authentication technologies, and in particular, to a security authentication method and system.
Background
With the rapid development of electronic information in China, the electronic network technology is popular in China and becomes an important component of daily life of people, and when people provide convenience for life in the electronic network, security authentication is an essential step, and the security authentication is important because of the relation of private information of each person.
In the prior art, when authentication is performed, account passwords, short messages, mailboxes and other factors are adopted for identification authentication in most cases, meanwhile, in the authentication process, a third party system is sometimes required to be accessed for authentication, but when the third party system is accessed, identification detection is not performed on the third party system, if the third party system has problems, leakage of user information is easily caused, and the security of the whole authentication system is reduced.
Disclosure of Invention
The invention aims to solve the defects in the prior art and provides a safety authentication method and a safety authentication system.
In order to achieve the above purpose, the present invention adopts the following technical scheme: the security authentication system comprises an authentication center, a server terminal, an information management library, a login module, an authentication mode authentication module, a security guarantee authentication module, an external module and a service module, wherein the login module consists of a touch display unit, a registration unit and a protocol unit, the security guarantee authentication module consists of an authentication unit and a backtracking unit, and the security guarantee authentication module consists of an information identification unit and an authentication unit.
A security authentication method comprising the steps of:
s1: and (3) login: firstly, a user opens a login module, clicks a protocol unit, clicks and confirms after carefully reading, if the registration is not completed, the user can click a registration unit to register information, after the information registration is completed, the information is encrypted and uploaded to an information management library to be stored, if the registration is completed, the user clicks a touch display unit to input corresponding identity information, and the next step is entered;
s2: identification of an authentication mode: the information recorded in the S1 is transmitted to an authentication mode authentication module, and after authentication of an authentication unit is completed, the next step is carried out; if the session is overtime, the backtracking unit receives the signal, and then the authentication mode identification module automatically identifies the early session authentication mode and automatically jumps to the authentication system corresponding to the authentication mode;
s3: and (3) safety guarantee authentication: after the authentication in the S2 authentication mode is completed, an authentication unit in the security assurance authentication module receives the signal and is connected with the authentication center, then the signal is sent to an information recognition unit, the information recognition unit compares the input information in the S1 with the information stored in the information management library, and if the information is correct, the next step is carried out; if the information identification is wrong or can not be identified, returning to the login module;
s4: and (3) business processing: and S4, after the information authentication is correct, the corresponding service module is correspondingly entered for service processing, and service processing information is transmitted to the server terminal.
In order to facilitate the access of the third party authentication system, the invention is improved in that the external module is provided with an external interface, and the external module is expanded to access the third party authentication system through the external interface.
In order to ensure the standardization of the third party authentication system, the invention is improved in that the external module further comprises a detection unit, the detection unit can detect the access to the third party authentication system, can identify the access to the third party authentication system after confirming that the third party authentication system is correct, uploads and stores information to the server terminal, and if the third party authentication system has a loophole, signals are sent to the server terminal to force the third party authentication system to be powered off.
In order to improve the diversity of authentication modes, the invention is improved in that the touch display unit comprises an account password, a short message, a mailbox and a random code multi-factor login interface.
In order to improve the confidentiality of information storage, the invention improves that the login module in S1 also comprises an encryption unit and an uploading unit, wherein the encryption unit encrypts the registration information and transmits the registration information to the information management library for storage through the uploading unit.
In order to improve the flexibility of the system, the login module further comprises a modification unit, and the modification unit can change information.
In order to improve the backup effect of the service processing file, the invention improves that the service module in S4 comprises a service processing unit and a feedback unit, and after the service processing unit finishes processing, service processing information is fed back to the server terminal through the feedback unit.
In order to improve the safety effect of the system authentication, the invention improves that the safety guarantee authentication module in the S3 further comprises a machine locking unit, and if the number of times of verification failure exceeds 3 times, the machine locking unit can forcedly take the system off the machine.
In order to improve the autonomous reaction effect of the system, the invention improves that the safety guarantee authentication module in S3 also comprises a warning unit, and if repeated errors occur in information output in the process of information auditing, the warning unit can sort the error information, upload the error information to the server terminal and send out an alarm.
Compared with the prior art, the invention has the advantages and positive effects that:
1. according to the invention, by arranging the detection unit, the third party authentication system can be detected when the third party authentication system is accessed, so that the problem of the authentication process caused by the problem of the third party authentication system is avoided, the leakage of user information is caused, and the information security of the whole authentication process is greatly improved.
2. According to the invention, by arranging the machine locking unit and the warning unit, when a problem occurs in the authentication process, the whole system can be forced to be powered off and an alarm can be sent to the server terminal in time, so that background staff can process the information in time, and the information security of the whole system is further improved.
Drawings
Fig. 1 is a schematic flow chart of a security authentication method and system according to the present invention.
Detailed Description
The present invention will be described in further detail with reference to the drawings and examples, in order to make the objects, technical solutions and advantages of the present invention more apparent. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the invention.
In the description of the present invention, it should be understood that the terms "length," "width," "upper," "lower," "front," "rear," "left," "right," "vertical," "horizontal," "top," "bottom," "inner," "outer," and the like indicate orientations or positional relationships based on the orientation or positional relationships shown in the drawings, merely to facilitate describing the present invention and simplify the description, and do not indicate or imply that the devices or elements referred to must have a specific orientation, be configured and operated in a specific orientation, and therefore should not be construed as limiting the present invention. Furthermore, in the description of the present invention, the meaning of "a plurality" is two or more, unless explicitly defined otherwise.
Referring to fig. 1, the present invention provides a technical solution: the security authentication system comprises an authentication center, a server terminal, an information management library, a login module, an authentication mode authentication module, a security guarantee authentication module, an external module and a service module, wherein the login module consists of a touch display unit, a registration unit and a protocol unit, the security guarantee authentication module consists of an authentication unit and a backtracking unit, and the security guarantee authentication module consists of an information identification unit and an authentication unit.
A security authentication method comprising the steps of:
s1: and (3) login: firstly, a user opens a login module, clicks a protocol unit, clicks and confirms after carefully reading, if the registration is not completed, the user can click a registration unit to register information, after the information registration is completed, the information is encrypted and uploaded to an information management library to be stored, if the registration is completed, the user clicks a touch display unit to input corresponding identity information, and the next step is entered;
s2: identification of an authentication mode: the information recorded in the S1 is transmitted to an authentication mode authentication module, and after authentication of an authentication unit is completed, the next step is carried out; if the session is overtime, the backtracking unit receives the signal, and then the authentication mode identification module automatically identifies the early session authentication mode and automatically jumps to the authentication system corresponding to the authentication mode;
s3: and (3) safety guarantee authentication: after the authentication in the S2 authentication mode is completed, an authentication unit in the security assurance authentication module receives the signal and is connected with the authentication center, then the signal is sent to an information recognition unit, the information recognition unit compares the input information in the S1 with the information stored in the information management library, and if the information is correct, the next step is carried out; if the information identification is wrong or can not be identified, returning to the login module;
s4: and (3) business processing: and S4, after the information authentication is correct, the corresponding service module is correspondingly entered for service processing, and service processing information is transmitted to the server terminal.
In this embodiment, the external connection module is provided with an external connection interface, and the external connection module is connected to the third party authentication system through the external connection interface in an expansion manner, so that when the authentication system needs to be connected to the third party authentication system, the data line can be directly inserted into the external connection interface, the operation is simple and quick, and the quick connection of the third party authentication system can be realized.
In this embodiment, the external module further includes a detection unit, the detection unit may detect the access to the third party authentication system, identify the third party authentication system after confirming that the third party authentication system is error-free, upload and store information to the server terminal, if a leak exists in the third party authentication system, send a signal to the server terminal, force the third party authentication system to be powered off, after the third party authentication system is accessed through the external interface, scan the detection unit first, the detection unit will check the third party authentication system, ensure that the third party authentication system can be authenticated after error-free, and further improve the security of the whole system if a problem occurs.
In this embodiment, the touch display unit includes an account password, a short message, a mailbox, and a random code multi-factor login interface, and multiple login modes including the account password, the short message, the mailbox, the random code and the like are arranged in the touch display unit, so that flexibility of the whole authentication system is greatly improved, and a use range of the whole authentication system is widened.
In this embodiment, the login module in S1 further includes an encryption unit and an uploading unit, where the encryption unit encrypts the registration information and transmits the registration information to the information management library for storage through the uploading unit, and when the new user completes registration, the encryption unit encrypts the identity information of the user and outputs the encrypted identity information to the uploading unit, and the encrypted identity information is transmitted to the information management library through the uploading unit, so that a layer of guarantee can be provided for the user information additionally, and easy leakage of the user information is avoided.
In this embodiment, the login module further includes a modification unit, the modification unit may change information, and the modification unit disposed inside the login module is directly connected to the information management library and the server terminal through the internet unit, so that a user can modify personal information simply and quickly.
In this embodiment, the service module in S4 includes a service processing unit and a feedback unit, after the service processing unit processes the service, the service processing information is fed back to the server terminal through the feedback unit, and when the user service is processed, the service processing unit directly sends a signal to the feedback unit, and then the feedback unit feeds back the service processing information to the server terminal, so as to perform backup in time.
In this embodiment, the security protection authentication module in S3 further includes a machine locking unit, if the number of times of verification failure exceeds 3 times, the machine locking unit will force the system to be powered off, and when the number of times of verification failure exceeds 3 times, the machine locking unit in the security protection authentication module will respond in time at this time, and judge that the user information leaks, force the system to be powered off, so as to ensure the security of the user information.
In this embodiment, the security authentication module in S3 further includes a warning unit, if in the process of information auditing, if the information output has repeated errors, the warning unit will sort the error information, upload to the server terminal and send out an alarm, and when the user information has repeated input errors, the warning unit will timely feed back the user information to the server terminal and remind, so as to ensure that the staff can respond timely.
Working principle: firstly, a user opens a login module, clicks a protocol unit, clicks a carefully read and then confirms a single click, the protocol unit confirms that the next step can be carried out, the user who does not finish registration can click the registration unit to register information, after the information registration is finished, the system encrypts the information and uploads the information to an information management library to store the information, the registered user can click a touch display unit, the user can select a corresponding login mode and input corresponding identity information according to own information, enter the next step after confirmation, then the information can be transmitted to an authentication mode identification module, the authentication unit can judge a specific authentication mode according to the input information, enter the next step after authentication is finished, if the authentication process is overtime, a backtracking unit in the authentication mode identification module can receive signals and dynamically identify a previous session authentication mode, meanwhile, the authentication system of the corresponding authentication mode is automatically jumped to, the authentication unit in the security guarantee authentication module receives the signal and is connected with the authentication center, then the signal is sent to the information recognition unit, the information recognition unit compares the login information with the information stored in the information management library, if the information is correct, the next step is carried out, if the third party authentication system is required to be accessed, the connection can be directly carried out through an external interface, after the connection is completed, the detection unit receives the signal to detect the third party authentication system, the authentication can be carried out after confirming that the third party authentication system is correct, the information is uploaded and stored in the server terminal, if the third party authentication system has a leak, the signal is sent to the server terminal, the third party authentication system is forced to be started down, so that the problem of the authentication process caused by the problem of the third party authentication system is avoided, the leakage of the user information is caused, and feedback is carried out to the server terminal; if the information identification is wrong or can not be identified, the login module is directly returned, if the number of times of verification failure exceeds 3, the machine locking unit can force the system to be started down, meanwhile, in the information verification process, the information output is repeated in error, the warning unit can sort error information and upload the error information to the server terminal to send out an alarm, a background worker can conveniently respond in time, after S4 information authentication is correct, the corresponding business module can be correspondingly entered into for business processing, business processing information is transmitted to the server terminal, and through setting the system, the safety of the whole authentication process can be effectively improved, and leakage of user information is avoided.
The present invention is not limited to the above embodiments, and any equivalent embodiments which can be changed or modified by the technical disclosure described above can be applied to other fields, but any simple modification, equivalent changes and modification made to the above embodiments according to the technical matter of the present invention will still fall within the scope of the technical disclosure.
Claims (8)
1. The safety authentication system comprises an authentication center, a server terminal, an information management library, a login module, an authentication mode authentication module, a safety guarantee authentication module, an external module and a service module, and is characterized in that: the login module consists of a touch display unit, a registration unit and a protocol unit, the security guarantee authentication module consists of an authentication unit and a backtracking unit, and the security guarantee authentication module consists of an information identification unit and an authentication unit;
the external module is provided with an external interface, and is connected with a third party authentication system through the external interface extension;
the external module further comprises a detection unit, the detection unit can detect the access to the third party authentication system, the identification can be carried out after the third party authentication system is confirmed to be correct, the information is uploaded and stored in the server terminal, and if the third party authentication system has a loophole, a signal is sent to the server terminal to force the third party authentication system to be powered off.
2. A security authentication system according to claim 1, wherein: the touch display unit comprises an account password, a short message, a mailbox and a random code multi-factor login interface.
3. A security authentication method, characterized in that: the method comprises the following steps:
s1: and (3) login: firstly, a user opens a login module, clicks a protocol unit, clicks and confirms after carefully reading, if the registration is not completed, the user can click a registration unit to register information, after the information registration is completed, the information is encrypted and uploaded to an information management library to be stored, if the registration is completed, the user clicks a touch display unit to input corresponding identity information, and the next step is entered;
s2: identification of an authentication mode: the information recorded in the S1 is transmitted to an authentication mode authentication module, and after authentication of an authentication unit is completed, the next step is carried out; if the session is overtime, the backtracking unit receives the signal, and then the authentication mode identification module automatically identifies the early session authentication mode and automatically jumps to the authentication system corresponding to the authentication mode;
s3: and (3) safety guarantee authentication: after the authentication in the S2 authentication mode is completed, an authentication unit in the security assurance authentication module receives the signal and is connected with the authentication center, then the signal is sent to an information recognition unit, the information recognition unit compares the input information in the S1 with the information stored in the information management library, and if the information is correct, the next step is carried out; if the information identification is wrong or can not be identified, returning to the login module;
s4: and (3) business processing: and S3, after the information authentication is correct, the corresponding service module is correspondingly entered for service processing, and service processing information is transmitted to the server terminal.
4. A security authentication method according to claim 3, characterized in that: the login module in S1 also comprises an encryption unit and an uploading unit, wherein the encryption unit encrypts the registration information and transmits the registration information to the information management library for storage through the uploading unit.
5. A security authentication method according to claim 3, characterized in that: the login module also comprises a modification unit, and the modification unit can change information.
6. A security authentication method according to claim 3, characterized in that: and the service module in S4 comprises a service processing unit and a feedback unit, and after the service processing unit finishes processing, service processing information is fed back to the server terminal through the feedback unit.
7. A security authentication method according to claim 3, characterized in that: and S3, the security assurance authentication module further comprises a machine locking unit, and if the number of times of verification failure exceeds 3, the machine locking unit can forcedly take the system off the machine.
8. A security authentication method according to claim 3, characterized in that: and S3, the safety guarantee authentication module further comprises a warning unit, and if repeated errors occur in information output in the information auditing process, the warning unit can sort error information, upload the error information to the server terminal and send out an alarm.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202110711530.7A CN113315786B (en) | 2021-06-25 | 2021-06-25 | Security authentication method and system |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202110711530.7A CN113315786B (en) | 2021-06-25 | 2021-06-25 | Security authentication method and system |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN113315786A CN113315786A (en) | 2021-08-27 |
| CN113315786B true CN113315786B (en) | 2023-05-26 |
Family
ID=77380296
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN202110711530.7A Active CN113315786B (en) | 2021-06-25 | 2021-06-25 | Security authentication method and system |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN113315786B (en) |
Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| KR20160062516A (en) * | 2014-11-25 | 2016-06-02 | 한국수력원자력 주식회사 | System and method for tracking plant trip cause using data link between plant gateway system and single point vulnerability monitor in CANDU Type NPPs |
| CN111158350A (en) * | 2020-01-16 | 2020-05-15 | 斯润天朗(北京)科技有限公司 | Diagnosis-based quality monitoring platform and system |
| CN112257007A (en) * | 2020-12-18 | 2021-01-22 | 垒途智能教科技术研究院江苏有限公司 | Enterprise financial information management system |
| CN112671700A (en) * | 2020-10-22 | 2021-04-16 | 垒途智能教科技术研究院江苏有限公司 | Enterprise economic management information safety system |
Family Cites Families (17)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US7610341B2 (en) * | 2003-10-14 | 2009-10-27 | At&T Intellectual Property I, L.P. | Filtered email differentiation |
| US7886343B2 (en) * | 2006-04-07 | 2011-02-08 | Dell Products L.P. | Authentication service for facilitating access to services |
| DK2693362T3 (en) * | 2012-07-31 | 2015-07-27 | Sick Ag | Detection system for mounting on a conveyor belt |
| KR101308210B1 (en) * | 2012-09-04 | 2013-09-13 | 이예행 | Classification system of e-mail by personalization with automatically and operating method thereof |
| WO2016097757A1 (en) * | 2014-12-18 | 2016-06-23 | Sophos Limited | A method and system for network access control based on traffic monitoring and vulnerability detection using process related information |
| CN105354507B (en) * | 2015-10-23 | 2018-09-11 | 浙江远望软件有限公司 | A kind of data safety time slot scrambling under cloud environment |
| CN106296112A (en) * | 2016-07-28 | 2017-01-04 | 广州猫眼网络科技有限公司 | Attendance checking system based on recognition of face, method and device thereof |
| CN108108156A (en) * | 2016-11-23 | 2018-06-01 | 上海冰穹网络科技有限公司 | SDK Subscriber Management Systems and method |
| CN107196943B (en) * | 2017-05-26 | 2019-09-20 | 浙江大学 | A method for implementing secure display of private data on a third-party platform |
| CN108985075A (en) * | 2017-06-02 | 2018-12-11 | 成都小娱网络科技有限公司 | A kind of image file disk encryption system and method for lightweight |
| CN107493378B (en) * | 2017-08-07 | 2020-05-26 | Oppo广东移动通信有限公司 | Method and apparatus for application program login, computer device and readable storage medium |
| CN107959680B (en) * | 2017-11-30 | 2020-05-12 | 哈尔滨森美朴科技发展有限责任公司 | Password-free registration login method and system |
| CN109120584B (en) * | 2018-06-19 | 2020-07-24 | 上海交通大学 | Terminal security protection method and system based on UEFI and WinPE |
| US10936725B2 (en) * | 2018-10-17 | 2021-03-02 | Accenture Global Solutions Limited | Container image vulnerability reduction |
| CN110708335A (en) * | 2019-10-29 | 2020-01-17 | 深圳市融壹买信息科技有限公司 | Access authentication method and device and terminal equipment |
| CN111245799B (en) * | 2020-01-02 | 2022-01-11 | 腾讯科技(深圳)有限公司 | Information monitoring method and device and readable storage medium |
| CN112512046B (en) * | 2020-12-16 | 2023-03-24 | 南京理工大学 | Safety detection method for short message verification code authentication process of Android application program |
-
2021
- 2021-06-25 CN CN202110711530.7A patent/CN113315786B/en active Active
Patent Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| KR20160062516A (en) * | 2014-11-25 | 2016-06-02 | 한국수력원자력 주식회사 | System and method for tracking plant trip cause using data link between plant gateway system and single point vulnerability monitor in CANDU Type NPPs |
| CN111158350A (en) * | 2020-01-16 | 2020-05-15 | 斯润天朗(北京)科技有限公司 | Diagnosis-based quality monitoring platform and system |
| CN112671700A (en) * | 2020-10-22 | 2021-04-16 | 垒途智能教科技术研究院江苏有限公司 | Enterprise economic management information safety system |
| CN112257007A (en) * | 2020-12-18 | 2021-01-22 | 垒途智能教科技术研究院江苏有限公司 | Enterprise financial information management system |
Non-Patent Citations (2)
| Title |
|---|
| An Evaluation of Chromium OS:the Next Generation Operating System;Meng Wang;Rich Wolski;;计算机教育(第05期);全文 * |
| 基于负荷管理系统的数据传输安全模式探讨;阴存贞;刘琰;黄研利;于春菊;杨文宇;;陕西电力(第06期);全文 * |
Also Published As
| Publication number | Publication date |
|---|---|
| CN113315786A (en) | 2021-08-27 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN103728894B (en) | The long-range control method of a kind of terminal unit and system | |
| CN104134253B (en) | A kind of gate control system and gate inhibition's deployment method | |
| CN101002212B (en) | Method and system for compound authentication registration control | |
| EP3712861A1 (en) | Information prompting method, apparatus, and system, and intelligent electronic door lock | |
| EP2803045B1 (en) | Method and system for certifying the presence of an operator | |
| US11341223B1 (en) | Wearable computing device secure access badge | |
| CN102164113A (en) | Face recognition login method and system | |
| US11727360B2 (en) | Method and system for reporting and monitoring location-related activities of mobile devices | |
| CN103873446A (en) | Method for logging in system | |
| CN106170793A (en) | System, method and apparatus for secure log | |
| CN112734989B (en) | Bluetooth key distribution method for intelligent door lock | |
| CN105844737A (en) | Camera based electronic lock system and use method | |
| CN102695170A (en) | Mobile platform possessing identity authentication function and identity authentication method | |
| US20220171839A1 (en) | Wearable computing device for automatic user validation | |
| CN113315786B (en) | Security authentication method and system | |
| CN116702110A (en) | Method, device, equipment and storage medium for sharing big data of supply chain | |
| CN112039664B (en) | Data communication method and system suitable for intelligent ammeter | |
| JP2005092407A (en) | Method, system, and program for managing attending and leaving office | |
| CN106033509A (en) | Method and system for computer room inspection | |
| CN116471076A (en) | Authentication login method and device for shared account | |
| CN108768993A (en) | The method and apparatus that associated terminal logs in | |
| TR201702782A2 (en) | One-time password message transmission. | |
| US12141255B2 (en) | Method for authenticating a user on client equipment | |
| CN108053507A (en) | A kind of management method of checking card based on cloud lock, system | |
| CN106385421A (en) | Signing and approving initiating user management method and equipment |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| GR01 | Patent grant | ||
| GR01 | Patent grant |