[go: up one dir, main page]

WO2019134234A1 - Procédé d'ouverture de session avec prévention contre un enracinement, dispositif, appareil terminal et support d'informations - Google Patents

Procédé d'ouverture de session avec prévention contre un enracinement, dispositif, appareil terminal et support d'informations Download PDF

Info

Publication number
WO2019134234A1
WO2019134234A1 PCT/CN2018/077313 CN2018077313W WO2019134234A1 WO 2019134234 A1 WO2019134234 A1 WO 2019134234A1 CN 2018077313 W CN2018077313 W CN 2018077313W WO 2019134234 A1 WO2019134234 A1 WO 2019134234A1
Authority
WO
WIPO (PCT)
Prior art keywords
verification
serial number
terminal
login
client
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/CN2018/077313
Other languages
English (en)
Chinese (zh)
Inventor
辜坤
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Technology Shenzhen Co Ltd
Original Assignee
Ping An Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Technology Shenzhen Co Ltd filed Critical Ping An Technology Shenzhen Co Ltd
Publication of WO2019134234A1 publication Critical patent/WO2019134234A1/fr
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • H04L63/0838Network architectures or network communication protocols for network security for authentication of entities using passwords using one-time-passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint

Definitions

  • the present application relates to the field of network security, and in particular, to a method, an apparatus, a terminal device, and a storage medium for preventing a brush login.
  • the C/S (Client/Server, Client and Server) structure is a common Internet architecture. By fully utilizing the advantages of the hardware environments at both ends, the tasks are reasonably distributed to the client and server. In order to maintain the security of the server, the server in the C/S structure needs to authenticate the client before performing the task.
  • the graphic verification code is a commonly used authentication method. At present, the graphic authentication code authentication method does not have an anti-brush mechanism, and the security is not high.
  • the embodiment of the present invention provides a method, a device, a terminal device, and a storage medium for preventing the brush registration, so as to solve the problem that the current graphic verification code authentication method does not have an anti-brush mechanism and the security is not high.
  • the embodiment of the present application provides a method for preventing a brush login, including:
  • the serial number information of the verification serial number is updated, a graphic verification code corresponding to the verification serial number is generated, and the graphic verification code is sent to the client corresponding to the terminal ID.
  • an apparatus for preventing a brush login including:
  • Obtaining a login verification request module configured to obtain a login verification request sent by the client, where the login verification request includes a terminal ID;
  • Determining a verification serial number module configured to query a database based on the terminal ID, and determine whether a verification serial number corresponding to the terminal ID exists in the database;
  • Sending a graphic verification code module if the verification serial number is valid, updating the serial number information of the verification serial number, generating a graphic verification code corresponding to the verification serial number, and transmitting the graphic verification code to the client corresponding to the terminal ID end.
  • a third aspect of the present application provides a terminal device including a memory, a processor, and computer readable instructions stored in the memory and executable on the processor, the computer readable instructions being implemented by a processor The following steps:
  • the verification serial number If the verification serial number is valid, updating the serial number information of the verification serial number, generating a graphic verification code corresponding to the verification serial number, and transmitting the graphic verification code to the client corresponding to the terminal ID end.
  • a fourth aspect of the present application provides a computer readable storage medium storing computer readable instructions that, when executed by a processor, implement the following steps:
  • the verification serial number If the verification serial number is valid, updating the serial number information of the verification serial number, generating a graphic verification code corresponding to the verification serial number, and transmitting the graphic verification code to the client corresponding to the terminal ID end.
  • the method, device, terminal device and storage medium of the anti-brushing login are implemented by determining whether the verification serial number corresponding to the terminal ID of the client is valid. If the verification serial number exists in the database, and when the verification serial number is valid, a graphic verification code corresponding to the verification serial number is generated, and the graphic verification code is sent to the client corresponding to the terminal ID.
  • the server only responds to the client that validates the serial number, which greatly reduces the risk of hacking the server after multiple flashes.
  • 1 is a flow chart of a method for preventing an anti-brushing in the first embodiment of the present application.
  • FIG. 2 is another specific flowchart of a method for preventing anti-brushing in Embodiment 1 of the present application.
  • FIG. 3 is another specific flowchart of a method for preventing anti-brushing in Embodiment 1 of the present application.
  • FIG. 4 is a schematic block diagram of an apparatus for preventing an anti-brushing in the second embodiment of the present application.
  • FIG. 5 is a schematic diagram of a terminal device in Embodiment 4 of the present application.
  • Fig. 1 is a flow chart showing a method of anti-brush registration in the embodiment. This embodiment is applied to the Internet architecture of the C/S (Client/Server, client and server) structure, wherein the execution entity of the solution is a server configured with a database. As shown in FIG. 1, the method for preventing the brush login includes the following steps:
  • the client in this embodiment includes, but is not limited to, a smart phone, a computer, a PAD, and the like, which can be used by the user to input information and interact with the server.
  • the login verification request is a request for the user to establish a secure connection after the user enters the authentication information (the authentication information can be a user ID and a user password) from the client.
  • the authentication information can be a user ID and a user password
  • the terminal ID is an identifier for identifying the client that sent the login verification request.
  • the server may determine, according to the terminal ID, an IP address for identifying the client or a login MAC address or the like.
  • the server is connected to the server through the login verification request sent by the client, and the security of the client can be confirmed before the server establishes a secure connection with the client.
  • the verification serial number is a unique number assigned by the server to the terminal ID corresponding to the client based on the first login verification request of any client.
  • the server can subsequently find the verification serial number corresponding to the client from the database based on the terminal ID of the client.
  • the verification serial number associated with the terminal ID is stored in the database, and the verification serial number of the terminal ID can be quickly matched in the server storing the massive data, and the client corresponding to the terminal ID is obtained.
  • Serial number information for secure verification based on the serial number information.
  • the serial number information is a login status of the terminal ID associated with the verification serial number, such as the number of logins of the verification serial number, the verification period, and the effective number of times.
  • the verification period is the time that the server sets the number of logins for the client according to the actual situation; the effective number is the maximum number of logins in the verification period set by the server according to the actual situation; the number of logins is the login verification request sent by the client. frequency.
  • the verification sequence number is valid, and vice versa. That is, when determining whether the verification sequence number is valid based on the serial number information, it is necessary to determine whether the current time of the system is within the verification period of the serial number information, and determine whether the number of logins corresponding to the terminal ID is within the effective number of serial number information, if the current system If the time is within the verification period, and the number of logins corresponding to the terminal ID is within the effective number, the verification serial number is valid; if the current time of the system is not within the verification period or the number of logins is not within the effective number, the verification serial number is invalid.
  • the serial number information of the client can be quickly obtained through the serial number information, so as to determine the validity of the verification serial number based on the serial number information, and provide a corresponding feedback action.
  • the serial number information of the verification sequence number corresponding to the terminal ID is updated to change the serial number information in real time.
  • the temporary database such as REDIS
  • No. Information REDIS is an open source, log-based, Key-Value database written in ANSI C, supporting the network, and can be persisted based on memory. Quick query can be achieved by using REDIS to store serial number information.
  • the verification period can be set to 2 minutes and the effective number can be set to 20 times. That is, if the client does not log in more than 20 times within 2 minutes, the client's verification serial number is still valid. Understandably, if the client has 20 logins in 2 minutes, the client's verification serial number is invalid.
  • the verification serial number is valid, and the serial number information associated with the verification serial number meets a preset requirement, including but not limited to: verifying the number of logins of the serial number within the valid number of times during the verification period of the verification serial number, and the like.
  • the server receives the login verification request, and determines that the verification sequence number is valid based on the obtained sequence number information associated with the terminal ID, and then needs to update the dynamic content in the sequence number information, for example, the verification sequence. Number of logins. Specifically, when the server receives a new login verification request, and when the verification serial number is valid, the number of logins of the verification serial number is incremented by 1, and so on.
  • the login verification request of the client is limited, and only the graphic verification code is sent to the client whose verification serial number is valid, thereby effectively protecting the server from the malicious flashing initiated by the client.
  • the method for preventing the brush login is implemented by determining whether the verification sequence number corresponding to the terminal ID of the client is valid. If the verification serial number exists in the database, and when the verification serial number is valid, a graphic verification code corresponding to the verification serial number is generated, and the graphic verification code is sent to the client corresponding to the terminal ID.
  • the server only responds to the client that validates the serial number. On the one hand, it greatly reduces the risk of hacking the server through multiple flashes. On the other hand, the access is restricted by the authentication serial number associated with the terminal ID. Increased user experience by restricting access to the server through IP.
  • the method for preventing the login is further included:
  • the verification sequence number is invalid, that is, the sequence number information associated with the current verification sequence number does not meet the preset requirement. It can be understood that when the number of logins of the verification serial number exceeds the effective number within the verification period of the verification serial number, the verification serial number is invalid.
  • the number of logins of the verification serial number exceeds the effective number, indicating that the client logs in to the server multiple times during the verification period, and there may be factors that the client is not secure.
  • the verification serial number corresponding to the client is also deleted in the database, which alleviates redundant data of the database, and facilitates the client to log in to the server again after unlocking. In this embodiment, by locking the client whose verification serial number is invalid, the server can be effectively protected from malicious brushing.
  • the login failure information is the notification information sent by the server to the client to notify the client of the login failure and to lock the information of the client during the lock period.
  • the server sends the login failure information to the client to remind the client to re-access the server after the lock period.
  • the method for preventing the login before the step S20, that is, before the step of determining whether there is a verification serial number corresponding to the terminal ID in the database, the method for preventing the login further includes:
  • the client there are various situations in the client that logs in to the server: the first login, the login when the verification serial number is valid, the login when the verification serial number is invalid, the login during the locked period, the login after unlocking, etc., in which case the client is When logging in during lockout, the login status corresponding to the terminal ID is locked.
  • the server After receiving the login verification request sent by the client, the server needs to quickly distinguish the login status of the client in order to respond to the response.
  • the terminal ID of the client first determines whether the client is in the locked state, and can quickly respond to the login verification request sent by the client.
  • the login failure information is notification information sent by the server to the client, to notify the client that the login fails, and the information that the client locks during the locking period.
  • the server sends the login failure information to the client, which is used to remind the client to log in to the server again after the lock period.
  • the user experience is improved by sending a login failure message to the client and giving the client a corresponding reminder.
  • the step of determining whether there is a verification sequence number corresponding to the terminal ID in the database is performed.
  • the client may be initially determined to be a secure client, and the subsequent verification of the verification serial number of the client may be performed.
  • the non-locked state here includes, but is not limited to, the first login, the login when the verification serial number is valid, the login after the verification serial number is invalid, and the login after the unlock.
  • the client is not locked, that is, not locked, and it can be confirmed that the client is temporarily a secure client, and the subsequent verification step (ie, the step after step S20) can be quickly performed, thereby improving the verification efficiency.
  • the method for preventing the login further includes:
  • the terminal ID of the client does not have a corresponding verification sequence number, indicating that the serial number information of the terminal ID does not exist in the database, and the server needs to establish a new record for the terminal ID for subsequent identification of the client.
  • a verification sequence number corresponding thereto is established based on the terminal ID
  • corresponding sequence number information is established based on the verification sequence number, so as to establish complete record information in the server for the client.
  • the serial number information of the initialization verification sequence number refers to setting the number of logins in the serial number information to 1, so that the last time the login verification request sent by the same client is received, the last record can be recorded. The number of logins is incremented by one to verify that the verification serial number is valid based on its number of logins.
  • the verification serial number is assigned to the client that does not have the verification serial number, it indicates that the client is the first login server, and the client can be temporarily determined to be a secure verification code.
  • the server can respond according to the serial number information of the client when the client applies for logging in to the server.
  • the method for preventing anti-brushing further includes: the serial number information includes a verification period and an effective number of times.
  • timing update instruction includes a program ID.
  • the timing update instruction is an instruction for initiating an effective number of times in updating the sequence number information.
  • the program ID is a unique number used to identify each instruction, and the server can call different program instructions by the program ID.
  • the verification sequence number corresponding to the verification period still exists, and it is proved that the verification sequence number is still valid, that is, the number of logins of the client is within the effective number of times. Because the serial number corresponding to the client is valid during the verification period, the client can be initially confirmed as a secure client, and the client can be assigned the next verification period. It can be understood that, at this time, the effective number of times corresponding to the verification sequence number is zero, that is, the verification sequence number is continued for one verification period.
  • the verification period can be set to 2 minutes and the effective number can be set to 20 times. That is, if the number of logins by the client within 2 minutes does not exceed 20 times, the client may initially determine that the client is a secure client, and the verification serial number may be reserved and corresponding to the next verification period. It can be understood that if the verification serial number corresponding to the client is within the effective number of times in the first 2 minutes, the maximum number of logins of the verification serial number may be 19 times in the second 2 minutes. At this time, it is necessary to clear the valid number of times corresponding to the verification serial number at the end of the first 2-minute verification period to re-count.
  • the server automatically continues the next verification period for the client whose verification serial number is valid, and ensures the security of the server, and is also beneficial to improving the customer experience.
  • the method for preventing the login is further included:
  • the access verification request is a request for the server to verify the current verification code by sending a current verification code to the server based on the graphic verification code sent by the server.
  • the server verifies the current verification code sent by the client, and is used to further determine the security of the client, so as to prevent the server from being maliciously initiated by the client.
  • the server each time the client corresponding to the terminal ID sends an access verification request to the server, the server obtains a graphic verification code stored in the database based on the terminal ID query, so as to match the current verification code input by the client based on the graphic verification code. verification. It can be understood that after the server sends the graphic verification code to the client corresponding to the terminal ID, the graphic verification code needs to be stored in the database, so as to perform security verification based on the graphic verification code.
  • the security state of the client can be determined, which is simple and effective.
  • the client that matches the current verification code sent with the graphic verification code in the server can quickly access the verification request, which simplifies the verification process and ensures the security of the server.
  • the server needs to confirm whether to send the graphic verification code to the client for verification, that is, the database needs to be queried based on the terminal ID in the access verification request, and the verification corresponding to the terminal ID is obtained.
  • the serial number and then performing the step of judging whether the verification serial number is valid based on the serial number information in the verification serial number (ie, step S30).
  • the serial number information corresponding to the terminal ID needs to be updated, and a graphic verification code is sent to the client to remind the client to re-enter the access verification request.
  • the serial number information can be used to quickly know the serial number information of the client, determine the validity of the verification serial number, and give corresponding feedback actions.
  • the security of the matching client may be firstly determined through the graphic verification code and the current verification, which is simple and effective; when the graphic verification code fails to pass the verification, The serial number information corresponding to the terminal ID is determined to perform a feedback action.
  • Fig. 5 is a block diagram showing the operation of the apparatus for preventing the brush registration in one-to-one correspondence with the method of the anti-friction registration in the first embodiment.
  • the device for preventing the brush registration includes a login verification request module 10, a determination verification serial number module 20, a determination serial number effective module 30, and a transmission graphic verification code module 40.
  • the steps of obtaining the login verification request module 10, determining the verification serial number module 20, determining the serial number validating module 30, and transmitting the graphic verification code module 40 correspond to the steps corresponding to the method for preventing the login in the embodiment, in order to avoid As described above, this embodiment will not be described in detail.
  • the login verification request module 10 is configured to obtain a login verification request sent by the client, where the login verification request includes a terminal ID.
  • the verification verification serial number module 20 is configured to query the database based on the terminal ID to determine whether there is a verification serial number corresponding to the terminal ID in the database.
  • the determining serial number validating module 30 is configured to determine, according to the serial number information in the verification serial number, whether the verification serial number is valid if the verification serial number exists.
  • Sending a graphic verification code module 40 if the verification serial number is valid, updating the serial number information of the verification serial number, generating a graphic verification code corresponding to the verification serial number, and transmitting the graphic verification code to the terminal ID corresponding to the terminal Client.
  • the device for preventing the brush registration further includes a clear verification serial number module 50.
  • the implementation function of the clearing verification serial number module 50 corresponds to the steps corresponding to the method for preventing the anti-sparking in the embodiment. To avoid redundancy, the present embodiment will not be described in detail.
  • the verification verification serial number module 50 is configured to clear the verification serial number in the database if the verification serial number is invalid, set the login status of the terminal ID to the locked state in the database, and send the login failure information to the client.
  • the device for preventing the login of the brush further includes a determination lock status module 60, a send login failure information module 70, and an execution verification serial number module 80.
  • the steps of determining the lock status module 60, the sending login failure information module 70, and the execution verification serial number module 80 are in one-to-one correspondence with the steps corresponding to the method for preventing the login in the embodiment. To avoid redundancy, the present embodiment does not. Detailed.
  • the lock status module 60 is configured to determine whether the login status corresponding to the terminal ID is a lock status.
  • the sending login failure information module 70 is configured to send the login failure information to the client if the login status is the locked state.
  • the verification verification serial number module 80 is configured to perform a step of determining whether there is a verification serial number corresponding to the terminal ID in the database if the login state is not the locked state.
  • the device for preventing the login of the brush further includes a distribution verification serial number module 90.
  • the implementation function of the distribution verification serial number module 90 corresponds to the steps corresponding to the method for preventing the login in the embodiment. To avoid redundancy, the present embodiment will not be described in detail.
  • the distribution verification serial number module 90 is configured to assign a corresponding verification serial number to the terminal ID if the verification serial number does not exist, initialize the serial number information of the verification serial number, generate a graphic verification code associated with the verification serial number, and display the graphic The verification code is sent to the client corresponding to the terminal ID.
  • the determining serial number validating module 30 is configured to verify that the serial number is valid if the current time of the system is within the verification period and the number of times the login verification request corresponding to the terminal ID is within the effective number, and vice versa.
  • the device for preventing the login of the brush further includes an acquisition update instruction module 110 and a departure update program module 120.
  • the implementation functions of the acquisition update command module 110 and the departure update program module 120 are in one-to-one correspondence with the steps S110 and S120 corresponding to the method for the anti-scratch registration in the first embodiment. To avoid redundancy, the present embodiment will not be described in detail.
  • the update instruction module 110 is configured to acquire a timing update instruction, where the timing update instruction includes a program ID and a trigger time.
  • the departure update program module 120 is configured to trigger an update program corresponding to the program ID when the current time of the system is the trigger time, and clear the verification sequence number that the current time of the system is not in the verification period.
  • the anti-scratch login device further includes an acquisition access request module 130, an acquisition graphic verification code module 140, an access verification request module 150, and an access verification verification request module 160.
  • the steps of the access access requesting module 130, the obtaining the graphic verification code module 140, the access verification requesting module 150, and the access denied verification requesting module 160 are corresponding to the steps corresponding to the method of the anti-sparking login in the embodiment, in order to avoid redundancy. This embodiment is not described in detail.
  • the access requesting module 130 is configured to obtain an access verification request sent by the client, where the access verification request includes a terminal ID and a current verification code.
  • the graphic verification code module 140 is configured to acquire a corresponding graphic verification code based on the terminal ID.
  • the access verification request module 150 is configured to access the verification request by accessing the verification code if the current verification code matches the graphic verification code.
  • the access verification request module 160 is configured to perform a step of determining whether the verification serial number is valid based on the serial number information in the verification serial number if the current verification code does not match the graphic verification code.
  • the embodiment provides a computer readable storage medium on which computer readable instructions are stored, and when the computer readable instructions are executed by the processor, the method for preventing the login in the embodiment 1 is implemented. I won't go into details here. Alternatively, when the computer readable instructions are executed by the processor, the functions of the modules/units in the apparatus for preventing the login in the second embodiment are implemented. To avoid repetition, details are not described herein again.
  • the computer readable storage medium may include any entity or device capable of carrying the computer readable instruction code, a recording medium, a USB flash drive, a removable hard disk, a magnetic disk, an optical disk, a computer memory, a read only memory (ROM, Read- Only Memory), Random Access Memory (RAM), electrical carrier signals, telecommunications signals, and software distribution media.
  • FIG. 5 is a schematic diagram of a device/terminal device for anti-brushing login according to an embodiment of the present application.
  • the device/terminal device 500 of the anti-spy login of this embodiment includes a processor 510, a memory 520, and computer readable instructions 530 stored in the memory 520 and operable on the processor 510, such as Brush the login program.
  • the processor 510 when executing the computer readable instructions 530, implements the steps in the method embodiments of the various anti-swipe logins described above, such as steps S10 through S40 shown in FIG.
  • processor 510 when executing computer readable instructions 530, implements the functions of the various modules/units of the various apparatus embodiments described above, such as the functions of modules 10-40 shown in FIG.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Power Engineering (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

La présente invention concerne un procédé d'ouverture de session avec prévention contre un enracinement, un dispositif, un appareil terminal et un support d'informations, se rapportant au domaine technique de la sécurité de réseau. Le procédé d'ouverture de session avec prévention contre un enracinement consiste à : acquérir une demande d'authentification d'ouverture de session envoyée par un client, la demande d'authentification d'ouverture de session comprenant un ID de terminal ; effectuer une recherche dans une base de données sur la base de l'ID de terminal, et déterminer si la base de données comprend un numéro de série d'authentification correspondant à l'ID de terminal ; si tel est le cas, déterminer, sur la base d'informations de numéro de série du numéro de série d'authentification, si le numéro de série d'authentification est valide ; si tel est le cas, mettre à jour les informations de numéro de série du numéro de série d'authentification, générer un code d'authentification graphique correspondant au numéro de série d'authentification, et envoyer le code d'authentification graphique au client correspondant à l'ID de terminal. Un serveur, selon le procédé, ne répond qu'à un client ayant un numéro de série d'authentification valide, réduisant ainsi remarquablement le risque de piratage du serveur par de multiples opérations d'enracinement.
PCT/CN2018/077313 2018-01-08 2018-02-27 Procédé d'ouverture de session avec prévention contre un enracinement, dispositif, appareil terminal et support d'informations Ceased WO2019134234A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201810014424.1A CN108462687B (zh) 2018-01-08 2018-01-08 防刷登录的方法、装置、终端设备及存储介质
CN201810014424.1 2018-01-08

Publications (1)

Publication Number Publication Date
WO2019134234A1 true WO2019134234A1 (fr) 2019-07-11

Family

ID=63221218

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/077313 Ceased WO2019134234A1 (fr) 2018-01-08 2018-02-27 Procédé d'ouverture de session avec prévention contre un enracinement, dispositif, appareil terminal et support d'informations

Country Status (2)

Country Link
CN (1) CN108462687B (fr)
WO (1) WO2019134234A1 (fr)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109508531A (zh) * 2018-10-17 2019-03-22 航天信息股份有限公司 签发软证书的方法、装置和存储介质
CN110161873B (zh) * 2019-06-12 2022-11-18 东屋世安物联科技(江苏)股份有限公司 一种智能家居传感器低功耗数据安全传输的方法和系统
CN110768995B (zh) * 2019-10-30 2022-04-01 北京达佳互联信息技术有限公司 安全验证方法、装置、系统及存储介质
CN112866179B (zh) * 2019-11-27 2023-06-27 北京沃东天骏信息技术有限公司 限流方法和限流装置
CN111181722A (zh) * 2020-03-06 2020-05-19 联想(北京)有限公司 一种认证方法及系统
CN111585956B (zh) * 2020-03-31 2022-09-09 完美世界(北京)软件科技发展有限公司 一种网址防刷验证方法与装置
CN112950236B (zh) * 2021-03-31 2023-05-23 四川虹美智能科技有限公司 序列号写入方法、装置及计算机可读介质
CN113486344B (zh) * 2021-07-14 2023-09-05 北京奇艺世纪科技有限公司 一种接口防刷方法、装置、服务端及存储介质

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1832401A (zh) * 2006-04-06 2006-09-13 陈珂 一种保护帐号密码安全的方法
CN102300182A (zh) * 2011-09-07 2011-12-28 飞天诚信科技股份有限公司 一种基于短信的身份验证方法、系统和装置
CN102546914A (zh) * 2010-12-27 2012-07-04 梁志龙 一种基于智能手机的自动登录系统及控制方法
US20170017890A1 (en) * 2015-07-14 2017-01-19 Jewel Dohan Method and System For Identifying Potentially Successful Dating Relationship

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9767040B2 (en) * 2015-08-31 2017-09-19 Salesforce.Com, Inc. System and method for generating and storing real-time analytics metric data using an in memory buffer service consumer framework
CN105897670A (zh) * 2015-11-13 2016-08-24 乐视云计算有限公司 网站用户登录认证方法及系统
CN106789855A (zh) * 2015-11-25 2017-05-31 北京奇虎科技有限公司 用户登录验证的方法及装置

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1832401A (zh) * 2006-04-06 2006-09-13 陈珂 一种保护帐号密码安全的方法
CN102546914A (zh) * 2010-12-27 2012-07-04 梁志龙 一种基于智能手机的自动登录系统及控制方法
CN102300182A (zh) * 2011-09-07 2011-12-28 飞天诚信科技股份有限公司 一种基于短信的身份验证方法、系统和装置
US20170017890A1 (en) * 2015-07-14 2017-01-19 Jewel Dohan Method and System For Identifying Potentially Successful Dating Relationship

Also Published As

Publication number Publication date
CN108462687B (zh) 2020-02-14
CN108462687A (zh) 2018-08-28

Similar Documents

Publication Publication Date Title
WO2019134234A1 (fr) Procédé d'ouverture de session avec prévention contre un enracinement, dispositif, appareil terminal et support d'informations
US9432339B1 (en) Automated token renewal using OTP-based authentication codes
CN101355556B (zh) 认证信息处理装置和认证信息处理方法
US10630676B2 (en) Protecting against malicious discovery of account existence
EP3226506B1 (fr) Préparation avancée d'un token d'autorisation
US20140223178A1 (en) Securing Communication over a Network Using User Identity Verification
US11868476B2 (en) Boot-specific key access in a virtual device platform
US11843601B2 (en) Methods, systems, and computer readable mediums for securely establishing credential data for a computing device
US10389693B2 (en) Keys for encrypted disk partitions
CN102713926A (zh) 机密信息泄露防止系统、机密信息泄露防止方法及机密信息泄露防止程序
CN111247521B (zh) 将多用户设备远程锁定为用户集合
CN113678131B (zh) 使用区块链保护在线应用程序和网页
US11252143B2 (en) Authentication system, authentication server and authentication method
US20180176197A1 (en) Dynamic Data Protection System
CN108121904B (zh) 解锁方法、装置、电子设备及服务器
WO2020001455A1 (fr) Procédé d'authentification d'ouverture de session de système d'exploitation linux fondé sur une cpk, dispositif, terminal et serveur
US20170093844A1 (en) Data Theft Deterrence
WO2016206090A1 (fr) Dispositif, appareil et procédé d'authentification à deux facteurs
TW201430608A (zh) 單點登入系統及方法
JP2003178029A (ja) 認証管理システムと方法、認証サーバ、セッション管理サーバおよびプログラム
WO2017219886A1 (fr) Procédé et dispositif d'authentification de protocole de réseau simple
CN116388998A (zh) 一种基于白名单的审计处理方法和装置
US10375056B2 (en) Providing a secure communication channel during active directory disaster recovery
US11416586B2 (en) Secure communication application registration process
CN115664823A (zh) 一种身份认证方法、装置、设备及存储介质

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18898707

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205 DATED 15.10.2020.)

122 Ep: pct application non-entry in european phase

Ref document number: 18898707

Country of ref document: EP

Kind code of ref document: A1