CN106302344A - Security sweep method and system - Google Patents

Security sweep method and system Download PDF

Info

Publication number
CN106302344A
CN106302344A CN201510279697.5A CN201510279697A CN106302344A CN 106302344 A CN106302344 A CN 106302344A CN 201510279697 A CN201510279697 A CN 201510279697A CN 106302344 A CN106302344 A CN 106302344A
Authority
CN
China
Prior art keywords
authentication mode
authentication
user
mode
force
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510279697.5A
Other languages
Chinese (zh)
Other versions
CN106302344B (en
Inventor
黎翠霞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201510279697.5A priority Critical patent/CN106302344B/en
Publication of CN106302344A publication Critical patent/CN106302344A/en
Application granted granted Critical
Publication of CN106302344B publication Critical patent/CN106302344B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The present invention provides a kind of security sweep method and system, including: data switched environment is carried out security sweep, to obtain scanning result;Judge whether the first authentication mode comes into force according to scanning result;Wherein, if described first authentication mode comes into force, then prompt for security context, and receive the password of user's input to authenticate;If described first authentication mode does not comes into force, then prompt for unsafe conditions, and receive user's selection to described first authentication mode Yu described second authentication mode, make corresponding authentication mode come into force according to the authentication mode that user selects, and receive the password of user's input to authenticate.The present invention, by the setting of multiple authentication mode, makes the contents diversification of security sweep, transparent and user interface and operation more directly perceived.

Description

Security sweep method and system
Technical field
The invention belongs to internet security field, particularly relate to a kind of security sweep method and system.
Background technology
The safe class of user is different, and the risk causing data to be faced when exchanging varies in size, it is therefore desirable to Take different defence behaves.Assessment to the safety of user, it is common that entered by the environment that data are exchanged Row security sweep and realize.
The website of common subsidiary security sweep, such as: some booking website and payment platforms.Wherein, one As booking website be by installing digital certificate and being inputted correct password by user and authenticate, described peace The content of full scan is generally only for whether downloading digital certificate in current data environment.And payment platform leads to Often do not show the content of its security sweep, but other auxiliary needing user to input outside password sometimes are tested Card mode, and its internal security sweep content underground, therefore user can be more vast and hazy.I.e., sometimes Pay and only need to input password, it is sometimes necessary to input password also receives note, and how the two selects, right For user, it is not disclosed.Therefore, it is substantially reduced the operating efficiency of user, and is easier to appearance Maloperation.
Summary of the invention
In view of this, it is an object of the invention to provide a kind of security sweep method and system, can solve existing There is the content of security sweep in technology single, opaque and user interface and the non-intuitive technical problem of operation, Substantially increase the operating efficiency of data exchange, maloperation can be effectively prevented from.
For solving above-mentioned technical problem, embodiments provide a kind of security sweep method, including:
Data switched environment is carried out security sweep, to obtain scanning result;
Judge whether the first authentication mode comes into force according to described scanning result;Wherein,
If described first authentication mode comes into force, then prompt for security context, and receive the password of user's input with Authenticate;
If described first authentication mode does not comes into force, then prompt for unsafe conditions, and receive user to described One authentication mode and the selection of described second authentication mode, make corresponding certification according to the authentication mode that user selects Mode comes into force, and receives the password of user's input to authenticate.
For solving above-mentioned technical problem, the embodiment of the present invention additionally provides a kind of security scanning systems, including:
Scan module, for carrying out security sweep to data switched environment, to obtain scanning result;
According to described scanning result, judge module, for judging whether the first authentication mode comes into force;
First authentication module, for when described first authentication mode comes into force, then prompts for security context, and Receive the password of user's input to authenticate;
Receiver module, for when described first authentication mode does not comes into force, prompts for unsafe conditions, and connects Receive user's selection to described first authentication mode Yu described second authentication mode;
Described first authentication module, is additionally operable to, when selecting described first authentication mode, make described first certification Mode comes into force;And
Second authentication module, for when selecting described second authentication mode, makes described second authentication mode raw Effect, and receive described password to authenticate.
Relative to prior art, the security sweep method and system of the present invention, by setting of multiple authentication mode Put, make the contents diversification of security sweep, transparent and user interface and operation more directly perceived, be greatly improved Operating efficiency, it is to avoid maloperation.
Accompanying drawing explanation
Fig. 1 is the applied environment schematic diagram of the security sweep method and system that the embodiment of the present invention provides;
Fig. 2 is the workflow schematic diagram of the security sweep method that the embodiment of the present invention one provides;
Fig. 3 is the workflow schematic diagram of the security sweep method that the embodiment of the present invention two provides;
Fig. 4 is the module diagram of the security scanning systems that the embodiment of the present invention three provides;
Fig. 5 is the time diagram of the security sweep method and system that the embodiment of the present invention four provides;
The user interface schematic diagram of the security sweep method and system that Fig. 6 provides for the embodiment of the present invention five;
The schematic diagram of the scan stripes of the security sweep method and system that Fig. 7 provides for the embodiment of the present invention five.
Detailed description of the invention
Refer in accompanying drawing is graphic, and the most identical element numbers represents identical assembly, and the present invention's is former Reason is to be implemented in a suitable computing environment illustrating.The following description is based on exemplified basis The specific embodiment of invention, it is not construed as limiting other specific embodiment that the present invention is the most detailed herein.
The principle of the invention illustrates with above-mentioned word, and it is not represented as a kind of restriction, this area tester Will appreciate that plurality of step and the operation of the following stated also may be implemented in the middle of hardware.The principle of the present invention makes Operate with other wide usages many or specific purpose computing, communication environment or configuration.
Refer to Fig. 1, for the applied environment schematic diagram of security sweep method and system in the present invention.Described should With environment, including client 10, data server 20, authentication server 30 and communication network 40.
It is understood that described client 10 includes: notebook, smart mobile phone or other can count Equipment according to exchange.Client 10 is used for performing described security sweep method or installing described security sweep system System.Described security sweep method and system, for carrying out data friendship at client 10 and data server 20 Before alternatively, connect authentication server 30 and authenticate.Wherein, described security sweep method and system, it is provided that Multiple authentication mode, is available for user and carries out personal settings and change according to the custom of self.
Data server 20, is used for carrying out data exchange between client 10.
It is understood that described data server 20, usually Cloud Server, it is used for carrying out paying, purchasing The data exchanges such as thing.
Authentication server 30, before carrying out data exchange in client 10 with data exchange server 20, According to the priority of default authentication mode, the environment exchanging described data carries out security sweep.
It is understood that described authentication server 30, it is mainly used in supporting described authentication mode.Such as, When authentication mode is note, send the note of certification to described client 10;When authentication mode is numeral card During book, it is provided that the download service of described digital certificate.
This case can be mainly used in the payment activity based on Web page application program.Refer to following example, Embodiment one lays particular emphasis on the basic steps of security sweep method, and embodiment two lays particular emphasis on the excellent of security sweep method Changing step, embodiment three lays particular emphasis on security scanning systems, and embodiment four lays particular emphasis on security sweep method and is The work schedule of system, and embodiment five lays particular emphasis on the user interface of security sweep method and system.It is appreciated that Although: each embodiment stress difference, but its design philosophy is consistent.And, in certain embodiment In there is no the part that describes in detail, may refer to description detailed description in full, repeat no more.
Embodiment one
Refer to Fig. 2, show the workflow schematic diagram of the security sweep method that inventive embodiments provides.
In step s 201, data switched environment is carried out security sweep, to obtain scanning result.
In step S202, judge whether the first authentication mode comes into force according to described scanning result, wherein, if Described first authentication mode comes into force, then perform step S203;If described first authentication mode does not comes into force, then hold Row step S204.
In step S203, prompt for security context, and receive the password of user's input to authenticate.
In step S204, prompt for unsafe conditions, and receive user the first authentication mode and second are recognized Card way choice.
This step also can be regarded as receiving the selection of user, and chooses whether it is the first authentication mode described in judgement, If wherein selecting described first authentication mode, then perform step S205, if non-selected described first authentication mode, Then it is considered as have selected the second authentication mode, and performs step S206.
Receive, it is understood that described, the step selected, specifically include:
(1) if described first authentication mode does not comes into force, then generate the first certification selector bar and the second certification selects Bar;
(2) receive user the selection of described first certification selector bar or described second certification selector bar is instructed;And
(3) select instruction according to described, trigger described first authentication mode or described second authentication mode.
Wherein, the generation step of described selector bar, specifically include:
(1) described first authentication mode of CGI interface polls user setting is called with described by AJAX mode Second authentication mode;
(2) call and render described first authentication mode and described second authentication mode corresponding activex control;
(3) attribute of browser is checked;And
(4) according to attribute and the described activex control of browser, described first selector bar and described second is generated Selector bar, and generate certification interactive interface.
In step S205, make the first authentication mode come into force, and return step S203 with described password together Authenticate.
In step S206, make the second authentication mode come into force, and together authenticate with described password.
It is understood that described first authentication mode and the second authentication mode, include but not limited to shield, Digital certificate, note, secret order or token.And by above-mentioned authentication mode, it is ensured that user carries out data exchange Verity.Wherein, described acquisition the first authentication mode or acquisition the second authentication mode, particularly as follows: download Shield, digital certificate, secret order or token, or accept the identifying code of the communication software in time such as note, wechat.
The security sweep method of the present invention, by the setting of multiple authentication mode, the content of security sweep is various Change, transparent and user interface and operation are more directly perceived, are greatly improved operating efficiency, it is to avoid maloperation.
Embodiment two
Refer to Fig. 3, show the workflow schematic diagram of the security sweep method that inventive embodiments provides. It is understood that Fig. 2 is the process optimization of security sweep method shown in Fig. 1.Wherein, in order to embody Fig. 1 Central Plains in steps with the difference of optimization step in Fig. 2, original step with S20 start, optimization step with S30 starts.The execution of following steps is according to the sequencing occurred, unless otherwise stated.
In step S301, generate the first authentication mode and the second authentication mode.
It is understood that the step of described generation authentication mode, specifically include:
(1) selecting two kinds of authentication modes from default multiple authentication mode, described authentication mode includes but does not limits In shield, digital certificate, note, secret order or token, and by above-mentioned authentication mode, it is ensured that user is carried out The verity of data exchange.
(2) it is that described two kinds of authentication modes arrange priority, and generates described respectively according to the height of priority One authentication mode and described second authentication mode.Wherein, the priority of acquiescence is: shield > digital certificate > Secret order or token.
In step s 302, receive the instruction of data exchange, and generate scan stripes.
It is illustrated in figure 7 the exemplary plot of scan stripes, including a progress coordinate, for showing that working as of scanning advances Degree.It is understood that the generation process of described scan stripes, specifically include following steps:
(1) instruction of data exchange is received;
(2) whether the attribute judging browser is preset senior browser, and described senior browser at least wraps Include: Google browser Chrome, red fox browser Firefox and more than IE10;
(3) if described senior browser, then described scanning is shown by the keyframe gradual-change animation of css3 The progress coordinate of bar, described progress coordinate includes original position and end position, uses JS animation band to reduce Come performance consumption with couple;And
(4) if not described senior browser, then setTimeout and setInterval in Javascript is used, Section converts the progress coordinate of described scan stripes at regular intervals.
In step s 201, data switched environment is carried out security sweep.
In step S202, it is judged that whether the first authentication mode comes into force, wherein, if described first authentication mode Come into force and then perform step S203, if described first authentication mode does not comes into force, perform step S204.
In step S203, prompt for security context, and receive the password of user's input to authenticate.
In step S204, prompt for unsafe conditions, and receive user the first authentication mode and second are recognized Card way choice.
This step also can be regarded as judging user's chooses whether it is the first authentication mode, if wherein selecting described First authentication mode, then perform step S205, if non-selected described first authentication mode, then be considered as have selected Second authentication mode, and perform step S206.
In step S205, make the first authentication mode come into force, and return step S203 with described password together Authenticate.
In step S206, make the second authentication mode come into force, and together authenticate with described password.
It is understood that described acquisition the first authentication mode or acquisition the second authentication mode, concrete execution is: Download shield, digital certificate, secret order or token, or accept from the communication software in time such as note or wechat Identifying code.
The security sweep method of the present invention, by the setting of multiple authentication mode, the content of security sweep is various Change, transparent and user interface and operation are more directly perceived, are greatly improved operating efficiency, it is to avoid maloperation.
Embodiment three
Refer to Fig. 4, show the module diagram of the security scanning systems that inventive embodiments provides.
Described security scanning systems 100, including: certification generation module 11, scan stripes 12, scan module 13, Judge module the 14, first authentication module 15, selector bar 16, receiver module 17 and the second authentication module 18。
Authentication mode generation module 11, is used for generating described first authentication mode and the second authentication mode.Specifically For, described authentication mode generation module 11 includes: select submodule and priority submodule.
It is understood that selection submodule, for selecting two kinds of authentication modes from default authentication mode, Wherein, described default authentication mode at least includes: shield, digital certificate and note.Priority submodule, For arranging priority for described two kinds of authentication modes, and generate described first certification according to the height of priority Mode and described second authentication mode.
Scan stripes 12, generates after the instruction receiving data exchange, for receiving the triggering of user to generate Security sweep instructs, to trigger described scan module.Wherein, described scan stripes 12 includes a progress Coordinate, the realization of described progress coordinate uses different implementation methods because of the difference of browser.
Wherein, if the browser of described scan stripes 12 is senior browser, such as Google's browser Chrome, red fox browser Firefox and more than IE10, then moved by the keyframe gradual change of css3 Drawing the progress coordinate showing described scan stripes, described progress coordinate includes original position and end position, with Reduce and use the performance consumption brought of JS animation and couple.
If the browser of described scan stripes 12 is not senior browser, such as IE9.0 and following, then use SetTimeout and setInterval in Javascript, interval converts described scan stripes at regular intervals Progress coordinate.
Scan module 13, for carrying out security sweep to data switched environment, to obtain scanning result.
Judge module 14, for according to described scanning result, it is judged that whether the first authentication mode comes into force.
First authentication module 15, for when described first authentication mode comes into force, prompts for security context, and Receive the password of user's input to authenticate.
Selector bar 16, including the first certification selector bar and the second certification selector bar.
Specifically, the realization of described selector bar includes: CGI interface, for being carried out by AJAX mode Call, to inquire about described first authentication mode and described second authentication mode that user sets;Activex control, User is corresponding with described first authentication mode and described second authentication mode, and receives the tune of shown CGI interface With with render;Check submodule, for checking the attribute of browser;And generation submodule, for basis The attribute of described browser and described activex control generate described first selector bar and described second selector bar.
Receiver module 17, for when described first authentication mode does not comes into force, is received by described selector bar and uses Family is to the first authentication mode and the selection of the second authentication mode.
Described receiver module 17 specifically includes:
Generate submodule, for when described first authentication mode does not comes into force, generate the first certification selector bar and Second certification selector bar;
Receive submodule, be used for receiving user to described first certification selector bar or described second certification selector bar Selection instruction;And
Triggers module, for the selection instruction received according to described reception submodule, recognizes described first Card mode or described second authentication mode trigger.
Described first authentication module 15, is additionally operable to, when selecting described first authentication mode, make described first to recognize Card mode comes into force.
Second authentication module 18, for when selecting described second authentication mode, making described second authentication mode Come into force, and together authenticate with described password.
It is understood that described first authentication mode and described second authentication mode, include but not limited to shield Board, digital certificate, note, secret order or token.And by above-mentioned authentication mode, it is ensured that user carries out data The verity of exchange.Wherein, described acquisition the first authentication mode or acquisition the second authentication mode, particularly as follows: Download shield, digital certificate, secret order or token, or accept testing of the communication software in time such as note, wechat Card code.
The security sweep method of the present invention, by the setting of multiple authentication mode, the content of security sweep is various Change, transparent and user interface and operation are more directly perceived, are greatly improved operating efficiency, it is to avoid maloperation.
Embodiment four
Refer to Fig. 5, show the time diagram of the security sweep method and system that inventive embodiments provides.
In step, client generates the first authentication mode and the second authentication mode.
In stepb, client is set up with data server and is connected, and receives the number from data server Instruction according to exchange.
In step C, client generates scan stripes in the page that data exchange.
In step D, client carries out security sweep to data switched environment.
In step E, client judges whether the first authentication mode comes into force.
In step F, client, when the first authentication mode comes into force, prompts for security context, and is connected to Authentication server is to receive the password of user's input to authenticate.
In step G, client, when the first authentication mode does not comes into force, prompts for unsafe conditions, and connects Receive user to the first authentication mode and the selection of the second authentication mode.
In steph, when user have selected the first authentication mode, client is connected to authentication server to be made First authentication mode comes into force, and the password receiving user's input together authenticates.
In step I, when user have selected the second authentication mode, client is connected to authentication server to be made Second authentication mode comes into force, and the password receiving user's input together authenticates.
In step J, after client completes authentication, start to carry out data exchange with data server.
It is understood that described first authentication mode and the second authentication mode, include but not limited to shield, Digital certificate, note, secret order or token.And by above-mentioned authentication mode, it is ensured that user carries out data exchange Verity.Wherein, described acquisition the first authentication mode or acquisition the second authentication mode, particularly as follows: download Shield, digital certificate, secret order or token, or accept the identifying code of the communication software in time such as note, wechat.
The security sweep method of the present invention, by the setting of multiple authentication mode, the content of security sweep is various Change, transparent and user interface and operation are more directly perceived, are greatly improved operating efficiency, it is to avoid maloperation.
Embodiment five
Refer to Fig. 6, show the user interface signal of the security sweep method and system that inventive embodiments provides Figure.User interface mainly divides two parts.Part I is: show scan stripes when data exchange;Second Divide and be: according to scanning result, display selector bar and authentication interface.Specifically:
Described scan stripes, also includes a progress coordinate, further referring to Fig. 7.When progress coordinate is from scan stripes Original position move to final position, i.e. complete security sweep, more intuitively.
When prompting for: during safe condition 1, when the i.e. first authentication mode comes into force, it is only necessary to input password can complete Authentication.Wherein, described first authentication mode is the digital certificate of acquiescence.
When prompting for: during unsafe condition, this figure is installed as a example by digital certificate 2 state by needs, then provide choosing Select bar, carry out (the first authentication mode (installation digital certificate) or the second authentication mode are used short-message verification Code) selection, and after completing the triggering of described first authentication mode or the second authentication mode, receive user The password of input, and complete authentication.Wherein if using short message verification code, also include that entrance needs checking The page of broken string identifying code state 3, carries out the input of short message verification code.
Wherein it is possible to be understood by, if the frequency that generally exchange of described data sends is higher, it will usually install Digital certificate, if the frequency that the exchange of described data sends is relatively low, it will usually select the mode of short-message verification.
The security sweep method of the present invention, by the setting of multiple authentication mode, the content of security sweep is various Change, transparent and user interface and operation are more directly perceived, are greatly improved operating efficiency, it is to avoid maloperation.
The security sweep method and system that the embodiment of the present invention provides belong to same design, and it implements process Referring to description in full, here is omitted.
In sum, although the present invention is disclosed above with preferred embodiment, but above preferred embodiment is not In order to limit the present invention, the common test personnel of this area, without departing from the spirit and scope of the present invention, All can make various change and retouching, therefore protection scope of the present invention defines in the range of standard with claim.

Claims (13)

1. a security sweep method, it is characterised in that including:
Data switched environment is carried out security sweep, to obtain scanning result;
Judge whether the first authentication mode comes into force according to described scanning result;Wherein,
If described first authentication mode comes into force, then prompt for security context, and receive the password of user's input with Authenticate;
If described first authentication mode does not comes into force, then prompt for unsafe conditions, and receive user to described One authentication mode and the selection of described second authentication mode, make corresponding certification according to the authentication mode that user selects Mode comes into force, and receives the password of user's input to authenticate.
2. scan method as claimed in claim 1, it is characterised in that data switched environment is being pacified Before full scan, further comprise the steps of:
Two kinds of authentication modes are selected from default multiple authentication mode;And
Priority is set for described two kinds of authentication modes, and generates described first certification according to the height of priority Mode and described second authentication mode;
Wherein, described default multiple authentication mode at least includes: shield, digital certificate and note.
3. scan method as claimed in claim 1, it is characterised in that described data switched environment is carried out Before security sweep, also include:
Receive the security sweep instruction that user is sent by driver sweep bar;And
According to the instruction of described security sweep, data switched environment is carried out security sweep.
4. scan method as claimed in claim 3, it is characterised in that pass through driver sweep receiving user Before the security sweep instruction that bar is sent, also include:
Receive the instruction of data exchange;
Whether the attribute judging browser is preset senior browser;Wherein,
If described senior browser, then generate scan stripes, and show described scan stripes by gradual-change animation Progress coordinate;
If not described senior browser, then generate scan stripes, and converted by prefixed time interval described The progress coordinate of scan stripes.
5. the scan method as described in any one of Claims 1-4, it is characterised in that if described first recognizes Card mode does not comes into force, then receive user's selection to the first authentication mode Yu described second authentication mode, specifically Comprise the steps:
If described first authentication mode does not comes into force, then generate the first certification selector bar and the second certification selector bar;
Receive user the selection of described first selector bar or described second selector bar is instructed;
According to the authentication mode selected by described selection instruction triggers user.
6. scan method as claimed in claim 5, it is characterised in that the generation of described selector bar, including Following steps:
Described first authentication mode and described that CGI interface polls user sets is called by AJAX mode Two authentication modes;
Call and render described first authentication mode and described second authentication mode corresponding activex control;
Check the attribute of browser;And
Attribute and described activex control according to browser generate described first selector bar and described second choosing Select bar, and generate certification interactive interface.
7. a security scanning systems, it is characterised in that including:
Scan module, for carrying out security sweep to data switched environment, to obtain scanning result;
According to described scanning result, judge module, for judging whether the first authentication mode comes into force;
First authentication module, for when described first authentication mode comes into force, prompts for security context, and connects Receive the password of user's input to authenticate;
Receiver module, for when described first authentication mode does not comes into force, prompts for unsafe conditions, and connects Receive user's selection to described first authentication mode Yu described second authentication mode;
Described first authentication module, is additionally operable to, when selecting described first authentication mode, make described first certification Mode comes into force;And
Second authentication module, for when selecting described second authentication mode, makes described second authentication mode raw Effect, and receive described password to authenticate.
8. scanning system as claimed in claim 7, it is characterised in that also include authentication mode generation module, Specifically include:
Select submodule, for selecting two kinds of authentication modes, wherein, institute from default multiple authentication mode State default multiple authentication mode at least to include: shield, digital certificate and note;
Priority submodule, for arranging priority for described two kinds of authentication modes, and according to the height of priority Described first authentication mode of low generation and described second authentication mode.
9. scanning system as claimed in claim 7, it is characterised in that also include:
Scan stripes, generates after the instruction receiving data exchange, for receiving the triggering of user to generate peace Full scan instructs, to trigger described scan module.
10. scanning system as claimed in claim 9, it is characterised in that described scan stripes includes a progress Coordinate, shows original position and end position by gradual-change animation.
11. scanning systems as claimed in claim 9, it is characterised in that described scan stripes includes a progress Coordinate, is converted by prefixed time interval.
12. scanning systems as described in claim 7 to 11, it is characterised in that described receiver module is concrete Including:
Generate submodule, for when described first authentication mode does not comes into force, generate the first certification selector bar and Second certification selector bar;
Receive submodule, be used for receiving user to described first certification selector bar or described second certification selector bar Selection instruction;And
Triggers module, for selecting instruction to described first authentication mode or described second certification according to described Mode triggers.
13. scanning systems as claimed in claim 12, it is characterised in that described selector bar specifically includes:
CGI interface, for being called by AJAX mode, described first set to inquire about user is recognized Card mode and described second authentication mode;
Activex control, user is corresponding with described first authentication mode and described second authentication mode, and receives Shown in the calling and rendering of CGI interface;
Check submodule, for checking the attribute of browser;And
Generate submodule, generate described first for the attribute according to described browser and described active control Selector bar and described second selector bar.
CN201510279697.5A 2015-05-27 2015-05-27 Security sweep method and system Active CN106302344B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510279697.5A CN106302344B (en) 2015-05-27 2015-05-27 Security sweep method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510279697.5A CN106302344B (en) 2015-05-27 2015-05-27 Security sweep method and system

Publications (2)

Publication Number Publication Date
CN106302344A true CN106302344A (en) 2017-01-04
CN106302344B CN106302344B (en) 2019-09-27

Family

ID=57634256

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510279697.5A Active CN106302344B (en) 2015-05-27 2015-05-27 Security sweep method and system

Country Status (1)

Country Link
CN (1) CN106302344B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107172049A (en) * 2017-05-19 2017-09-15 北京信安世纪科技有限公司 A kind of intelligent identity identification system
CN107749844A (en) * 2017-10-16 2018-03-02 维沃移动通信有限公司 Auth method and mobile terminal
CN108985871A (en) * 2018-05-30 2018-12-11 太仓鸿策创达广告策划有限公司 Network cipher Verification System

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070194112A1 (en) * 2006-02-23 2007-08-23 Petroskey Steven M Security summary for retail receipt
CN101216923A (en) * 2008-01-07 2008-07-09 中国工商银行股份有限公司 A system and method to enhance the data security of e-bank dealings
CN102347941A (en) * 2011-06-28 2012-02-08 奇智软件(北京)有限公司 Open-platform-based security application control method
CN103745364A (en) * 2014-01-06 2014-04-23 王小凡 Scan code differential scanning-based anti-fake method and scan code differential scanning method
CN103870750A (en) * 2012-12-12 2014-06-18 腾讯科技(武汉)有限公司 Method and device for achieving device safety scanning in browser

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070194112A1 (en) * 2006-02-23 2007-08-23 Petroskey Steven M Security summary for retail receipt
CN101216923A (en) * 2008-01-07 2008-07-09 中国工商银行股份有限公司 A system and method to enhance the data security of e-bank dealings
CN102347941A (en) * 2011-06-28 2012-02-08 奇智软件(北京)有限公司 Open-platform-based security application control method
CN103870750A (en) * 2012-12-12 2014-06-18 腾讯科技(武汉)有限公司 Method and device for achieving device safety scanning in browser
CN103745364A (en) * 2014-01-06 2014-04-23 王小凡 Scan code differential scanning-based anti-fake method and scan code differential scanning method

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107172049A (en) * 2017-05-19 2017-09-15 北京信安世纪科技有限公司 A kind of intelligent identity identification system
CN107749844A (en) * 2017-10-16 2018-03-02 维沃移动通信有限公司 Auth method and mobile terminal
CN108985871A (en) * 2018-05-30 2018-12-11 太仓鸿策创达广告策划有限公司 Network cipher Verification System

Also Published As

Publication number Publication date
CN106302344B (en) 2019-09-27

Similar Documents

Publication Publication Date Title
CN104574057B (en) Online payment method and related equipment and system
CN105490815B (en) Short message verification code acquisition methods and device, login method, apparatus and system
US10771455B2 (en) System and method for enabling secure authentication
US20160210632A1 (en) Secured payment method and relevant device and system
CN104143068B (en) Method of password authentication and system
CN105307287A (en) Connection method and wearable equipment
CN104618314A (en) Method, device and system for password reset
CN104091140A (en) Information processing method and electronic device
CN103873455A (en) Method and device for information check
CN106302344A (en) Security sweep method and system
CN104753892A (en) Network resource transmission method, device and system
CN105208232A (en) Method and device for automatically making call
CN105095744A (en) Application access method and device
CN105809419A (en) Online banking transaction system
CN105740670A (en) Application encryption method and device, and application startup method and device
CN105205001A (en) Testing method, device and system for game program
CN105809433A (en) Online banking transaction method
CN110276608A (en) Payment processing method, device, readable storage medium storing program for executing and computer equipment
CN107067244A (en) Service implementation method, method of payment, business realizing device and payment services end
CN104079527A (en) Information processing method and electronic equipment
CN104967512A (en) Security verification prompting method and apparatus
CN114493370A (en) Safe access method and device for business product
KR102115908B1 (en) User equipment and control method thereof
US9355241B2 (en) Method for providing a dynamic code via a telephone
CN106330881A (en) Safety verification method and safety verification device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant