CN106411886A - Sign-off initiating user management method and equipment - Google Patents

Sign-off initiating user management method and equipment Download PDF

Info

Publication number
CN106411886A
CN106411886A CN201610864393.XA CN201610864393A CN106411886A CN 106411886 A CN106411886 A CN 106411886A CN 201610864393 A CN201610864393 A CN 201610864393A CN 106411886 A CN106411886 A CN 106411886A
Authority
CN
China
Prior art keywords
sign
user
initiates
key
request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610864393.XA
Other languages
Chinese (zh)
Other versions
CN106411886B (en
Inventor
曹海
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xingluo Home Yunwulian Technology Co ltd
Original Assignee
Guangzhou Crane Internet Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Crane Internet Technology Co Ltd filed Critical Guangzhou Crane Internet Technology Co Ltd
Priority to CN201610864393.XA priority Critical patent/CN106411886B/en
Publication of CN106411886A publication Critical patent/CN106411886A/en
Application granted granted Critical
Publication of CN106411886B publication Critical patent/CN106411886B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • H04L63/205Network architectures or network communication protocols for network security for managing network security; network security policies in general involving negotiation or determination of the one or more network security mechanisms to be used, e.g. by negotiation between the client and the server or between peers or by selection according to the capabilities of the entities involved
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/103Workflow collaboration or project management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/062Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/105Multiple levels of security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Business, Economics & Management (AREA)
  • Human Resources & Organizations (AREA)
  • Strategic Management (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Data Mining & Analysis (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Tourism & Hospitality (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Telephonic Communication Services (AREA)
  • Storage Device Security (AREA)

Abstract

Embodiments of the invention provide a sign-off initiating user management method and equipment, which are applied to an electronic sign-off process, wherein the sign-off initiating user management method comprises the following steps of judging whether a login environment of a sign-off initiating user is abnormal when a sign-off request of the sign-off initiating user is received; and if a judging result is yes, when a key request of the sign-off initiating user is received, distributing a key to the sign-off initiating user in order to make the sign-off initiating user initiate an sign-off application after encryption of the sign-off request. Through the method, the safety of the electronic sign-off process is improved and the user experience is guaranteed.

Description

A kind of sign-off initiates user management method and equipment
Technical field
The present invention relates to networking technology area, initiate user management method and equipment particularly to a kind of sign-off.
Background technology
In the prior art, the sign-off of file usually manually to be carried out, and within a particular process, needing will be corresponding File printout out, and is passed to each in the way of artificial and needs at the approved officer of sign-off, and operating process is loaded down with trivial details, time-consuming takes Power, inefficiency;And when certain approved officer not when, being normally carried out of whole flow process will be stopped over.
For this reason, have at present mentioning a kind of mode of approving electronic, but this mode safety is not high, the body of impact user Test.
Content of the invention
For defect of the prior art, the present invention proposes a kind of sign-off and initiates user management method and equipment, in order to Overcome defect of the prior art, improve the safety of approving electronic, ensure the experience of user.
Specifically, the present invention proposes embodiment in detail below:
The embodiment of the present invention proposes a kind of sign-off and initiates user management method, is applied to approving electronic process, including:
When receiving the sign-off request that sign-off initiates user, judge whether the login environment of described sign-off initiation user is different Often;
If the determination result is YES, when receiving the key request that described sign-off initiates user, it is that described sign-off initiates to use Key is distributed at family, so that described sign-off initiates to initiate to sign after user is encrypted to the request of described sign-off based on the key being distributed Core application.
Further, in a specific embodiment, described " when the key request receiving described sign-off and initiating user When, it is that described sign-off initiates user's distribution key ", including:
When receiving the key request that described sign-off initiates user, determine the corresponding sign-off application of described sign-off request Rank;
If described be superior to default threshold value, it is that described sign-off initiates user's distribution key.
Further, in a specific embodiment, described " when the key request receiving described sign-off and initiating user When, it is that described sign-off initiates user's distribution key ", including:
When receiving the key request that described sign-off initiates user, determine that described sign-off initiates the authority of user;
If the authority credentials of described authority is more than default authority threshold value, it is that described sign-off initiates user's distribution key.
Further, in a specific embodiment, be preset with multiple keys, each key to should have encryption level, plus Level of confidentiality is not higher, and safety is higher;
Described " when receiving the key request that described sign-off initiates user, is that described sign-off initiation user's distribution is close Key ", including:
When receiving the key request that described sign-off initiates user, determine that described sign-off initiates authority and the institute of user State the rank of the corresponding sign-off application of sign-off request
Encryption level is determined based on described authority and described rank;
Corresponding encryption key distribution is chosen based on described encryption level and initiates user to described sign-off.
Further, in a specific embodiment, described login environment specifically includes login IP;
Described judge sign-off initiate user login environment whether abnormal, including:
When receiving the sign-off request that sign-off initiates user, obtain the login IP that sign-off initiates user;
Determine the value-at-risk of described login IP based on the IP in described login IP and default abnormal IP data base;
If value-at-risk exceedes default risk threshold value, determine described login environmental abnormality;
If the low excessively default risk threshold value of value-at-risk, determine that described login environment is not abnormal.
The embodiment of the present invention also proposed a kind of sign-off and initiates user management device, is applied to approving electronic process, including:
Judge module, for when receiving the sign-off request that sign-off initiates user, judging that described sign-off initiates user's Whether abnormal log in environment;
Distribute module, for being yes when judged result, and when receiving the key request of described sign-off initiation user, is institute State sign-off and initiate user's distribution key, so that described sign-off initiates user being carried out to the request of described sign-off based on the key being distributed Sign-off application is initiated after encryption.
Further, in a specific embodiment, described distribute module, it is used for:
When receiving the key request that described sign-off initiates user, determine the corresponding sign-off application of described sign-off request Rank;
If described be superior to default threshold value, it is that described sign-off initiates user's distribution key.
Further, in a specific embodiment, described distribute module, it is used for:
When receiving the key request that described sign-off initiates user, determine that described sign-off initiates the authority of user;
If the authority credentials of described authority is more than default authority threshold value, it is that described sign-off initiates user's distribution key.
Further, in a specific embodiment, be preset with multiple keys, each key to should have encryption level, plus Level of confidentiality is not higher, and safety is higher;
Described distribute module, is used for:
When receiving the key request that described sign-off initiates user, determine that described sign-off initiates authority and the institute of user State the rank of the corresponding sign-off application of sign-off request
Encryption level is determined based on described authority and described rank;
Corresponding encryption key distribution is chosen based on described encryption level and initiates user to described sign-off.
Further, in a specific embodiment, described login environment specifically includes login IP;
Described judge module, is used for:
When receiving the sign-off request that sign-off initiates user, obtain the login IP that sign-off initiates user;
Determine the value-at-risk of described login IP based on the IP in described login IP and default abnormal IP data base;
If value-at-risk exceedes default risk threshold value, determine described login environmental abnormality;
If the low excessively default risk threshold value of value-at-risk, determine that described login environment is not abnormal.
Compared with prior art, the embodiment of the present invention proposes a kind of sign-off and initiates user management method and equipment, application In approving electronic process, wherein, this sign-off is initiated user management method and is included:Receive the sign-off request that sign-off initiates user When, judge whether extremely described sign-off initiates the login environment of user;If the determination result is YES, initiate when receiving described sign-off During the key request of user, it is that described sign-off initiates user's distribution key, so that described sign-off initiates user based on being distributed Key initiates sign-off application after the request of described sign-off is encrypted.With this, by said method, improve approving electronic process Safety, ensured the experience of user.
Brief description
In order to be illustrated more clearly that the technical scheme of the embodiment of the present invention, below will be attached to use required in embodiment Figure is briefly described it will be appreciated that the following drawings illustrate only certain embodiments of the present invention, and it is right to be therefore not construed as The restriction of scope, for those of ordinary skill in the art, on the premise of not paying creative work, can also be according to this A little accompanying drawings obtain other related accompanying drawings.
A kind of sign-off that Fig. 1 proposes for the embodiment of the present invention initiates user management method schematic flow sheet;
A kind of method flow whether login environment is estimated extremely that Fig. 2 proposes for the embodiment of the present invention is illustrated Figure;
A kind of method flow schematic diagram of the method for distribution key that Fig. 3 proposes for the embodiment of the present invention;
A kind of method flow schematic diagram of the method for distribution key that Fig. 4 proposes for the embodiment of the present invention;
A kind of method flow schematic diagram of the method for distribution key that Fig. 5 proposes for the embodiment of the present invention;
A kind of sign-off that Fig. 6 proposes for the embodiment of the present invention initiates the structural representation of user management device.
Specific embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Site preparation description is it is clear that described embodiment is only a part of embodiment of the present invention, rather than whole embodiments.Generally Can be arranged with various different configurations and design with the assembly of the embodiment of the present invention shown described in the accompanying drawing herein.Cause This, be not intended to limit claimed invention to the detailed description of the embodiments of the invention providing in the accompanying drawings below Scope, but it is merely representative of the selected embodiment of the present invention.Based on embodiments of the invention, those skilled in the art are not doing The every other embodiment being obtained on the premise of going out creative work, broadly falls into the scope of protection of the invention.
For defect of the prior art, the inventors discovered that in actual application, sign-off initiates the peace that user occurs Full problem is larger, for this reason, the present invention proposes a kind of sign-off initiates user management method and equipment, is applied to approving electronic mistake Journey, in order to improve the safety of approving electronic process.
Specifically, the present invention proposes embodiment in detail below:
The embodiment of the present invention 1 proposes a kind of sign-off and initiates user management method, is applied to approving electronic process, such as Fig. 1 Shown, comprise the following steps:
Step 101, when receiving the sign-off request that sign-off initiates user, judge the login ring of described sign-off initiation user Whether border is abnormal;
Step 102, if the determination result is YES, when receiving the key request that described sign-off initiates user, is described label Core initiates user's distribution key, so that described sign-off initiates user being encrypted to the request of described sign-off based on the key being distributed Initiate sign-off application afterwards.
In a specific embodiment, such as certain employee in a company wants to ask for leave, namely wants to initiate one Sign-off application, this employee is accomplished by initiating the flow process of a sign-off application, and in this process, this employee just initiates to use as sign-off Family.
And in addition to the sign-off application with regard to asking for leave, sign-off application can also have a lot of other embodiments, for example, close In the approving electronic of reimbursement, and the approving electronic with regard to order of being transferred and promoted etc., and corresponding, the user initiating sign-off process is Initiate user for sign-off.
Sign-off initiates user firstly the need of login, could initiate sign-off process, and therefore sign-off initiation user can step at one Record interface input account, the log-on message such as password, in a specific embodiment, the environment of input account and password is Log in environment.And follow-up sign-off application is also to initiate in same environment, the safety therefore logging in environment can affect Safety to sign-off application;For this reason, being accomplished by login environment is detected, to determine the intensity of anomaly logging in environment, I.e. unsafe degree.
It is contemplated that logging in the environment that environment is network in a specific embodiment, critically important as one by this IP Network identity, the safety to place network environment has very strong reference significance, just allowing for this point, can be based on stepping on Record IP whether login environment is estimated extremely.A kind of specific embodiment with regard to step 101, it is as shown in Fig. 2 can To comprise the steps:
Step S1, when receive sign-off initiate user sign-off request when, obtain sign-off initiate user login IP;Specifically , it is not unanimously to obtain the login IP that sign-off initiates user with this, only initiate user when determination sign-off and will initiate sign-off Shen Please when, namely receive sign-off initiate user sign-off request when the operation that just can be obtained.
Step S2, determine the risk of described login IP based on the IP in described login IP and default abnormal IP data base Value;
If step S3 value-at-risk exceedes default risk threshold value, determine described login environmental abnormality;
If the low excessively default risk threshold value of step S4 value-at-risk, determine that described login environment is not abnormal.
Specifically, based on IP (Internet Protocol, the agreement of interconnection between network) come detected, first Get sign-off initiate user be located log in environment login IP, and and in the abnormal IP data base of the abnormal IP that is stored with inquire about There is related IP to determine the value-at-risk logging in IP with this login IP.
In a specific embodiment, such as by judging to there may be directly with login IP in abnormal IP data base The IP quantity connecing in succession logs in the value-at-risk of IP to carry out judgement, and with regard to step 101, described login environment specifically includes login IP;
Thus, step 101, namely extremely whether the described login environment judging sign-off initiation user, including:
When receiving the sign-off request that sign-off initiates user, obtain described sign-off and initiate during user's transmission logging request Log in IP;
Judge that described login IP whether there is in the abnormal IP data base prestoring;
If the determination result is YES it is determined that described sign-off initiates the login environmental abnormality of user;
If judged result is no it is determined that described sign-off initiates the login environment of user not extremely
More than, the data of abnormal IP, and the data life based on this abnormal IP in the particular embodiment, can be got in advance Become abnormal IP data base, specifically abnormal IP data can be obtained, with this abnormal IP meeting from the data base with regard to safety There is directly or indirectly relation with the such as behavior such as swindle, can be existed with this risky.
Thus, by judging whether the login IP that sign-off initiates during user's transmission logging request is to pass through during risky IP Judging to log in IP with the presence or absence of to carry out in abnormal IP data base, if log in IP being present in abnormal IP data base, saying Bright login IP is abnormal IP, and then may determine that login environmental abnormality, conversely, then explanation logs in environment not extremely, is just Normal.
Additionally, in other specific embodiments, for example can by judge in abnormal IP data base with login IP there are the IP quantity being directly connected to carry out judge log in IP value-at-risk, specifically, be directly connected to can be for example Log in the website of access exception IP under the network scenarios of IP;Quantity is more, and corresponding value-at-risk is bigger.
In another specific embodiment, it is also contemplated that specific abnormal IP itself in addition to considering to connect Hazardness, authorize harm weight to each abnormal IP based on hazardness, during further evaluation, except consider quantity in addition to, for Each abnormal IP being directly connected to, in addition it is also necessary to harm weight in view of this abnormal IP, is come jointly by this two factors with this Judge to log in the value-at-risk of IP, a kind of specific determination mode can be that for example value-at-risk can be the sum of the value of harm weight.
And after determining the value-at-risk logging in IP, based on this value-at-risk and risk threshold value relatively determining login ring Whether border is abnormal.In a specific embodiment, such as value-at-risk is 5, and risk threshold value is 6, then can determine login environment Not abnormal.
If judging to log in environment not extremely, then carry out step 103, namely carry out follow-up initiation according to normal flow process The operation of sign-off.
And if in the case of judging to log in environmental abnormality, carry out step 102, namely initiating to use when receiving described sign-off During the key request at family, it is that described sign-off initiates user's distribution key, so that described sign-off initiation user is close based on distributed Key initiates sign-off application after the request of described sign-off is encrypted.Specifically, key is that one kind is being converted to ciphertext in plaintext or is inciting somebody to action Ciphertext is converted to the parameter inputting in the algorithm of plaintext.
Specific allocation flow can several ways as follows:
Mode 1 as shown in figure 3, step 102 namely described " when the key request receiving described sign-off and initiating user When, it is that described sign-off initiates user's distribution key " may comprise steps of:
Step 11, when receiving the key request that described sign-off initiates user, determine that described sign-off request is corresponding The rank of sign-off application;
If step 12 is described is superior to default threshold value, it is that described sign-off initiates user's distribution key.
In this specific embodiment, be rank based on sign-off application to determine whether to distribute key, for example have important Sign-off application, be for example related to fund distribution sign-off application, just for its distribute key, to initiate sign-off application carry out add Close, so that sign-off sponsor smoothly safely initiates sign-off application.
Mode 2 as shown in figure 4, step 102 namely described " when the key request receiving described sign-off and initiating user When, it is that described sign-off initiates user's distribution key " may comprise steps of:
Step 21, when receiving the key request that described sign-off initiates user, determine that described sign-off initiates the power of user Limit;
If the authority credentials of the described authority of step 22 is more than default authority threshold value, it is that described sign-off initiation user's distribution is close Key.
In this specific embodiment, it is to determine whether to distribute key based on the authority that sign-off initiates user, for example, has Important approved officer's, e.g. general manager's rank, corresponding authority is very high, during current initiation sign-off application, just distributes for it Key, is encrypted to the sign-off application initiated, so that sign-off sponsor smoothly safely initiates sign-off application.
Mode 3, wherein it is preset with multiple keys, to there being encryption level, encryption level is higher, and safety is got over for each key High;In the case, step 102, namely described " when receiving the key request that described sign-off initiates user, be described label Core initiates user's distribution key ", as shown in figure 5, may comprise steps of:Specifically include step:
Step 31, when receiving the key request that described sign-off initiates user, determine that described sign-off initiates the power of user The rank of the sign-off application corresponding to limit and the request of described sign-off;
Step 32, encryption level is determined based on described authority and described rank;
Step 33, choose corresponding encryption key distribution based on described encryption level and initiate user to described sign-off.
In this specific embodiment, it is that comprehensive sign-off initiates the authority of user and the label that the request of described sign-off is corresponding The rank of core application is determining the encryption level of distributed key;Specifically, such as general manager initiated one critically important Sign-off application, in the case, is that general manager distributes an encryption level very high key, the sign-off application initiated is carried out Encryption is so that sign-off sponsor smoothly initiates sign-off application it is ensured that initiating the smooth of sign-off process and safety.
The embodiment of the present invention proposes a kind of sign-off and initiates user management method and equipment, is applied to approving electronic process, Wherein, this sign-off initiation user management method includes:When receiving the sign-off request that sign-off initiates user, judge that described sign-off is sent out Whether the login environment playing user is abnormal;If the determination result is YES, when receiving the key request that described sign-off initiates user, Initiate user's distribution key for described sign-off, so that described sign-off initiates user asking to described sign-off based on the key being distributed Sign-off application is initiated after being encrypted.With this, by said method, improve the safety of approving electronic process, ensured use The experience at family.
In order to be further detailed to the present invention, the embodiment of the present invention 2 also discloses a kind of sign-off and initiates user's pipe Reason equipment, is applied to approving electronic process, as shown in fig. 6, including:
Judge module 201, for when receiving the sign-off request that sign-off initiates user, judging that described sign-off initiates user Login environment whether abnormal;
Distribute module 202, for being yes when judged result, and when receiving the key request of described sign-off initiation user, Initiate user's distribution key for described sign-off, so that described sign-off initiates user asking to described sign-off based on the key being distributed Sign-off application is initiated after being encrypted.
In a specific embodiment, described distribute module 202, it is used for:
When receiving the key request that described sign-off initiates user, determine the corresponding sign-off application of described sign-off request Rank;
If described be superior to default threshold value, it is that described sign-off initiates user's distribution key.
In a specific embodiment, described distribute module 202, it is used for:
When receiving the key request that described sign-off initiates user, determine that described sign-off initiates the authority of user;
If the authority credentials of described authority is more than default authority threshold value, it is that described sign-off initiates user's distribution key.
In a specific embodiment, it is preset with multiple keys, each key to there being encryption level, get over by encryption level Height, safety is higher;
Described distribute module 202, is used for:
When receiving the key request that described sign-off initiates user, determine that described sign-off initiates authority and the institute of user State the rank of the corresponding sign-off application of sign-off request
Encryption level is determined based on described authority and described rank;
Corresponding encryption key distribution is chosen based on described encryption level and initiates user to described sign-off.
In a specific embodiment, described login environment specifically includes login IP;
Described judge module 201, is used for:
When receiving the sign-off request that sign-off initiates user, obtain the login IP that sign-off initiates user;
Determine the value-at-risk of described login IP based on the IP in described login IP and default abnormal IP data base;
If value-at-risk exceedes default risk threshold value, determine described login environmental abnormality;
If the low excessively default risk threshold value of value-at-risk, determine that described login environment is not abnormal.
Compared with prior art, the embodiment of the present invention proposes a kind of sign-off and initiates user management method and equipment, application In approving electronic process, wherein, this sign-off is initiated user management method and is included:Receive the sign-off request that sign-off initiates user When, judge whether extremely described sign-off initiates the login environment of user;If the determination result is YES, initiate when receiving described sign-off During the key request of user, it is that described sign-off initiates user's distribution key, so that described sign-off initiates user based on being distributed Key initiates sign-off application after the request of described sign-off is encrypted.With this, by said method, improve approving electronic process Safety, ensured the experience of user.
It will be appreciated by those skilled in the art that accompanying drawing is a schematic diagram being preferable to carry out scene, the module in accompanying drawing or Flow process is not necessarily implemented necessary to the present invention.
It will be appreciated by those skilled in the art that module in device in implement scene can according to implement scene describe into Row is distributed in the device of implement scene it is also possible to carry out one or more dresses that respective change is disposed other than this implement scene In putting.The module of above-mentioned implement scene can merge into a module it is also possible to be further split into multiple submodule.
The invention described above sequence number is for illustration only, does not represent the quality of implement scene.
Only the several of the present invention disclosed above are embodied as scene, but, the present invention is not limited to this, Ren Heben What the technical staff in field can think change all should fall into protection scope of the present invention.

Claims (10)

1. a kind of sign-off initiates user management method it is characterised in that being applied to approving electronic process, including:
When receiving the sign-off request that sign-off initiates user, judge whether extremely described sign-off initiates the login environment of user;
If the determination result is YES, when receiving the key request that described sign-off initiates user, it is that described sign-off initiation user divides Join key, so that described sign-off initiates to initiate sign-off Shen after user is encrypted to the request of described sign-off based on the key being distributed Please.
2. sign-off as claimed in claim 1 initiates user management method it is characterised in that described " when receiving described sign-off During the key request of initiation user, it is that described sign-off initiates user's distribution key ", including:
When receiving the key request that described sign-off initiates user, determine the level of the corresponding sign-off application of described sign-off request Not;
If described be superior to default threshold value, it is that described sign-off initiates user's distribution key.
3. sign-off as claimed in claim 1 initiates user management method it is characterised in that described " when receiving described sign-off During the key request of initiation user, it is that described sign-off initiates user's distribution key ", including:
When receiving the key request that described sign-off initiates user, determine that described sign-off initiates the authority of user;
If the authority credentials of described authority is more than default authority threshold value, it is that described sign-off initiates user's distribution key.
4. sign-off as claimed in claim 1 initiates user management method it is characterised in that being preset with multiple keys, each key To there being encryption level, encryption level is higher, and safety is higher;
Described " when receiving the key request that described sign-off initiates user, be that described sign-off initiates user's distribution key ", bag Include:
When receiving the key request that described sign-off initiates user, determine that described sign-off initiates the authority of user and described label The rank of the corresponding sign-off application of core request
Encryption level is determined based on described authority and described rank;
Corresponding encryption key distribution is chosen based on described encryption level and initiates user to described sign-off.
5. sign-off as claimed in claim 1 initiates user management method it is characterised in that described login environment specifically includes Log in IP;
Described when receiving the sign-off request that sign-off initiates user, judge whether the login environment of described sign-off initiation user different Often, including:
When receiving the sign-off request that sign-off initiates user, obtain the login IP that sign-off initiates user;
Determine the value-at-risk of described login IP based on the IP in described login IP and default abnormal IP data base;
If value-at-risk exceedes default risk threshold value, determine described login environmental abnormality;
If the low excessively default risk threshold value of value-at-risk, determine that described login environment is not abnormal.
6. a kind of sign-off initiates user management device it is characterised in that being applied to approving electronic process, including:
Judge module, for when receiving the sign-off request that sign-off initiates user, judging that described sign-off initiates the login of user Whether environment is abnormal;
Distribute module, for being yes when judged result, and when receiving the key request of described sign-off initiation user, is described label Core initiates user's distribution key, so that described sign-off initiates user being encrypted to the request of described sign-off based on the key being distributed Initiate sign-off application afterwards.
7. sign-off as claimed in claim 6 initiates user management device it is characterised in that described distribute module, is used for:
When receiving the key request that described sign-off initiates user, determine the level of the corresponding sign-off application of described sign-off request Not;
If described be superior to default threshold value, it is that described sign-off initiates user's distribution key.
8. sign-off as claimed in claim 6 initiates user management device it is characterised in that described distribute module, is used for:
When receiving the key request that described sign-off initiates user, determine that described sign-off initiates the authority of user;
If the authority credentials of described authority is more than default authority threshold value, it is that described sign-off initiates user's distribution key.
9. sign-off as claimed in claim 6 initiates user management device it is characterised in that being preset with multiple keys, each key To there being encryption level, encryption level is higher, and safety is higher;
Described distribute module, is used for:
When receiving the key request that described sign-off initiates user, determine that described sign-off initiates the authority of user and described label The rank of the corresponding sign-off application of core request
Encryption level is determined based on described authority and described rank;
Corresponding encryption key distribution is chosen based on described encryption level and initiates user to described sign-off.
10. sign-off as claimed in claim 6 initiates user management device it is characterised in that described login environment specifically wraps Include login IP;
Described judge module, is used for:
When receiving the sign-off request that sign-off initiates user, obtain the login IP that sign-off initiates user;
Determine the value-at-risk of described login IP based on the IP in described login IP and default abnormal IP data base;
If value-at-risk exceedes default risk threshold value, determine described login environmental abnormality;
If the low excessively default risk threshold value of value-at-risk, determine that described login environment is not abnormal.
CN201610864393.XA 2016-09-29 2016-09-29 Signing and issuing user management method and device Active CN106411886B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610864393.XA CN106411886B (en) 2016-09-29 2016-09-29 Signing and issuing user management method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610864393.XA CN106411886B (en) 2016-09-29 2016-09-29 Signing and issuing user management method and device

Publications (2)

Publication Number Publication Date
CN106411886A true CN106411886A (en) 2017-02-15
CN106411886B CN106411886B (en) 2020-05-12

Family

ID=59228386

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610864393.XA Active CN106411886B (en) 2016-09-29 2016-09-29 Signing and issuing user management method and device

Country Status (1)

Country Link
CN (1) CN106411886B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1719768A (en) * 2004-07-09 2006-01-11 千乡万才科技(中国)有限公司 Electronic authorizing and signing protection system and method thereof
CN101282218A (en) * 2008-05-20 2008-10-08 宇龙计算机通信科技(深圳)有限公司 Method and apparatus for ciphering and deciphering host computer and pickaback plane of split type terminal
CN101364869A (en) * 2007-08-09 2009-02-11 鸿富锦精密工业(深圳)有限公司 Electronic document digital checking system and method
CN104348809A (en) * 2013-08-02 2015-02-11 深圳市腾讯计算机系统有限公司 Network security monitoring method and system
CN105323210A (en) * 2014-06-10 2016-02-10 腾讯科技(深圳)有限公司 Method, apparatus and cloud server for detecting website security

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1719768A (en) * 2004-07-09 2006-01-11 千乡万才科技(中国)有限公司 Electronic authorizing and signing protection system and method thereof
CN101364869A (en) * 2007-08-09 2009-02-11 鸿富锦精密工业(深圳)有限公司 Electronic document digital checking system and method
CN101282218A (en) * 2008-05-20 2008-10-08 宇龙计算机通信科技(深圳)有限公司 Method and apparatus for ciphering and deciphering host computer and pickaback plane of split type terminal
CN104348809A (en) * 2013-08-02 2015-02-11 深圳市腾讯计算机系统有限公司 Network security monitoring method and system
CN105323210A (en) * 2014-06-10 2016-02-10 腾讯科技(深圳)有限公司 Method, apparatus and cloud server for detecting website security

Also Published As

Publication number Publication date
CN106411886B (en) 2020-05-12

Similar Documents

Publication Publication Date Title
CN108881232B (en) Sign-on access method, apparatus, storage medium and the processor of operation system
US9467475B2 (en) Secure mobile framework
CN108200050A (en) Single logging-on server, method and computer readable storage medium
US20170046693A1 (en) Systems and methods for detecting and resolving data inconsistencies among networked devices using hybrid private-public blockchain ledgers
US12022000B2 (en) Method for information processing in digital asset certificate inheritance transfer, and related device
CN105871838A (en) Third party account login control method and user center platform
CN104125062A (en) Login method, device, login authentication device, server, terminals and system
CN105933245A (en) Secure and credible access method in software defined network
CN106357807B (en) A kind of data processing method, device and system
CN106411837A (en) Privilege management method and apparatus
CN105721439A (en) Method of improving safety performance of FTP server
CN110313003A (en) Authentication management method and system
CN106331003A (en) Method and device for accessing application portal system on cloud desktop
CN112115484B (en) Access control method, device, system and medium for application program
CN110516470A (en) Access control method, device, equipment and storage medium
CN105187417B (en) Authority acquiring method and apparatus
CN103176987A (en) Method and device for controlling database access
CN107317813A (en) Terminal logs in method and system
CN106357657A (en) Method and device for managing sign initiating user
CN106411886A (en) Sign-off initiating user management method and equipment
CN105592031A (en) User login method and system based on identity authentication
CN106411890A (en) Signature initiation user management method and device
US20140164242A1 (en) Controlling Accounts of Online Transaction Platform
CN105933305B (en) A kind of principal and subordinate's cipher management method of information system
CN108830075A (en) A kind of application program management-control method of SSR centralized management platform

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20190215

Address after: Room 201, Building A, No. 1 Qianwan Road, Qianhai Shenzhen-Hong Kong Cooperation Zone, Shenzhen, Guangdong 518000

Applicant after: HENGDA WISDOM TECHNOLOGY Co.,Ltd.

Address before: 510000 Room 3601, 78 Huangpu Avenue West, Tianhe District, Guangzhou City, Guangdong Province

Applicant before: GUANGZHOU HEYI INTERNET TECHNOLOGY CO.,LTD.

GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20230927

Address after: No. 15, Jiannan Road, Nanyou Community, Yuehai Street, Nanshan District, Shenzhen, Guangdong 518000 Hengda Tianjing B2801

Patentee after: Xingluo home yunwulian Technology Co.,Ltd.

Address before: Room 201, Building A, No. 1 Qianwan Road, Qianhai Shenzhen-Hong Kong Cooperation Zone, Shenzhen, Guangdong 518000

Patentee before: HENGDA WISDOM TECHNOLOGY Co.,Ltd.