CN106790267A - A kind of method and apparatus of access server operating system - Google Patents

A kind of method and apparatus of access server operating system Download PDF

Info

Publication number
CN106790267A
CN106790267A CN201710075885.5A CN201710075885A CN106790267A CN 106790267 A CN106790267 A CN 106790267A CN 201710075885 A CN201710075885 A CN 201710075885A CN 106790267 A CN106790267 A CN 106790267A
Authority
CN
China
Prior art keywords
password
logging request
identifying code
user name
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710075885.5A
Other languages
Chinese (zh)
Inventor
张国磊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhengzhou Yunhai Information Technology Co Ltd
Original Assignee
Zhengzhou Yunhai Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhengzhou Yunhai Information Technology Co Ltd filed Critical Zhengzhou Yunhai Information Technology Co Ltd
Priority to CN201710075885.5A priority Critical patent/CN106790267A/en
Publication of CN106790267A publication Critical patent/CN106790267A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations

Abstract

The embodiment of the invention discloses a kind of method and apparatus of access server operating system, security verification device is installed in server OS, the contact details of keeper are previously stored with the security verification device, after the first logging request for access server operating system for receiving client transmission, username and password is carried in the first logging request;Username and password to being carried in the first logging request is verified;After being verified, then according to the contact details of keeper, identifying code is sent to the corresponding equipment of contact details;Receive client transmission for access operating system again the second logging request after, user name, password and identifying code are carried in the second logging request;User name, password and identifying code to being carried in the second logging request are verified;If being proved to be successful, allow to access the server OS.By safety verification twice, the security of Admin Access's server OS is effectively improved.

Description

A kind of method and apparatus of access server operating system
Technical field
The present invention relates to field of computer technology, more particularly to a kind of method of access server operating system and dress Put.
Background technology
Server is all in use, to be in most cases deployed in computer room in batch, due to large number of, it is entered Row management, traditional unit way to manage is obviously unsuitable.It is right that usual keeper can be realized by the way of remote control The management of server.With the popularization and application and the fast development of network technology of computer technology, information security has turned into society The serious problems of each field common concern.Used as the foundation stone of information security, the security of operating system turns into academia naturally Study hotspot.
In traditional approach, keeper can be used in safety shell protocol (Secure Shell, SSH) client by being input into The mode of name in an account book and password, enters into the administration interface of the server, realizes the access to server OS, and keeper is not Must be in the action, the management to server can be achieved with by remote control.But once username and password is by other staff It is illegal to obtain, the safety of server OS may be threatened.
It can be seen that, the security of keeper's access server operating system how is lifted, it is that those skilled in the art urgently solve Problem certainly.
The content of the invention
The purpose of the embodiment of the present invention is to provide a kind of method and apparatus of access server operating system, can effectively carry Rise the security of keeper's access server operating system.
In order to solve the above technical problems, the embodiment of the present invention provides a kind of method of access server operating system, application In security verification device, the security verification device is installed on the server OS, in the security verification device The contact details of keeper are previously stored with, methods described includes:
The first logging request for access server operating system that client sends is received, being logged in described first please Username and password is carried in asking;
The user name and the password to being carried in first logging request are verified;
After being verified, then according to the contact details of the keeper, sent to the corresponding equipment of the contact details and tested Card code;
The second logging request for accessing operating system again that client sends is received, in second logging request In carry the user name, the password and the identifying code;
The user name, the password and the identifying code to being carried in second logging request are verified;If It is proved to be successful, then allows to access the server OS.
Optionally, the user name and the password to being carried in first logging request carries out checking bag Include:
The username and password for prestoring is obtained from the server OS;
Judge the user name that carries in first logging request and the password whether with the user for obtaining Name is consistent with the password.
Optionally, the contact details according to the keeper, checking is sent to the corresponding equipment of the contact details Code includes:
According to the phone number included in the contact details, sent to the mobile phone of the keeper by SMS platform and taken Short message with the identifying code.
Optionally, the contact details according to the keeper, checking is sent to the corresponding equipment of the contact details Code includes:
According to the Email Accounts included in the contact details, sent to the mailbox of the keeper by mailbox platform and taken Mail with the identifying code.
Optionally, the user name, the password and the identifying code to being carried in second logging request Carrying out checking includes:
The username and password for prestoring is obtained from the server OS;
Judge the user name, the password and the identifying code that carry in second logging request whether with acquisition The user name, the password and generation the identifying code it is consistent.
The embodiment of the present invention also provides a kind of device of access server operating system, is applied to security verification device, institute State security verification device and be installed on the server OS, be previously stored with keeper's in the security verification device Contact details, described device includes receiving unit, authentication unit and transmitting element:
The receiving unit, the first login for access server operating system for receiving client transmission please Ask, username and password is carried in first logging request;
The authentication unit, for testing the user name and the password that are carried in first logging request Card;
After being verified, then the transmitting element is triggered, the transmitting element is believed for the contact according to the keeper Breath, identifying code is sent to the corresponding equipment of the contact details;
The receiving unit is additionally operable to receive the second logging request for accessing operating system again that client sends, The user name, the password and the identifying code are carried in second logging request;
The authentication unit is additionally operable to the user name, the password and described to being carried in second logging request Identifying code is verified;If being proved to be successful, allow to access the server OS.
Optionally, the authentication unit includes obtaining subelement and judgment sub-unit:
The acquisition subelement, for obtaining the username and password for prestoring from the server OS;
The judgment sub-unit, the user name and the password for judging to be carried in first logging request are It is no consistent with the user name for obtaining and the password.
Optionally, the transmitting element is specifically for according to the phone number included in the contact details, by short message Platform sends the short message for carrying the identifying code to the mobile phone of the keeper.
Optionally, the transmitting element is specifically for according to the Email Accounts included in the contact details, by mailbox Platform sends the mail for carrying the identifying code to the mailbox of the keeper.
Optionally, the authentication unit includes obtaining subelement and judgment sub-unit:
The acquisition subelement, for obtaining the username and password for prestoring from the server OS;
The judgment sub-unit, for judge to carry in second logging request the user name, the password and Whether the identifying code is consistent with the identifying code of the user name, the password and generation that obtain.
By above-mentioned technical proposal as can be seen that by installing security verification device in server OS, the safety The contact details of keeper are previously stored with checking equipment, are being operated for access server for client transmission is received After first logging request of system, username and password is carried in first logging request;To in first logging request The user name and the password for carrying are verified;After being verified, then according to the contact details of the keeper, to institute State the corresponding equipment of contact details and send identifying code;Receiving for accessing operating system again the second of client transmission After logging request, the user name, the password and the identifying code are carried in second logging request;To described second The user name, the password and the identifying code carried in logging request are verified;If being proved to be successful, allow to access The server OS.It can be seen that, by safety verification twice, checking for the first time can ensure the correctness of log-on message, For the second time it is verified the mode of addition dynamic verification code, it is to avoid when log-on message is obtained by other staff by improper means Rear unauthorized access server OS is taken, the harm caused to server OS effectively improves Admin Access The security of server OS.
Brief description of the drawings
In order to illustrate more clearly the embodiments of the present invention, the accompanying drawing to be used needed for embodiment will be done simply below Introduce, it should be apparent that, drawings in the following description are only some embodiments of the present invention, for ordinary skill people For member, on the premise of not paying creative work, other accompanying drawings can also be obtained according to these accompanying drawings.
Fig. 1 is a kind of flow chart of the method for access server operating system provided in an embodiment of the present invention;
Fig. 2 is a kind of structural representation of the device of access server operating system provided in an embodiment of the present invention.
Specific embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Site preparation is described, it is clear that described embodiment is only a part of embodiment of the invention, rather than whole embodiments.Based on this Embodiment in invention, those of ordinary skill in the art are not under the premise of creative work is made, and what is obtained is every other Embodiment, belongs to the scope of the present invention.
In order that those skilled in the art more fully understand the present invention program, with reference to the accompanying drawings and detailed description The present invention is described in further detail.
Next, the method that a kind of access server operating system that the embodiment of the present invention is provided is discussed in detail.Fig. 1 is A kind of flow chart of the method for access server operating system provided in an embodiment of the present invention, is applied to security verification device, institute State security verification device and be installed on the server OS, be previously stored with keeper's in the security verification device Contact details, methods described includes:
S101:Receive the first logging request for access server operating system that client sends;Described first Username and password is carried in logging request.
Client can be the equipment that proper communication is realized with the server OS, and keeper can be by client Realize the remote management to server OS.In embodiments of the present invention, client can specifically use ssh client.
By taking a server as an example, remote management, keeper are carried out to the server OS for the ease of keeper The operating system can be accessed by way of being input into username and password in corresponding client.In order to ensure server operation The security of system, username and password only keeper possess.
In implementing, keeper can input user name and close in the remote access operation system interface of client Code, after client receives the username and password of keeper's input, just can send first and log in server OS Request, username and password can be carried in first logging request.
In embodiments of the present invention, security verification device, user end to server behaviour are installed in server OS The first logging request for making system transmission can be by the security verification device direct access.
S102:The user name and the password to being carried in first logging request are verified.
Security verification device after the first logging request is received, for the user name for ensureing to carry in the first logging request With the correctness of password, it is necessary to be verified to the username and password.
In view of the username and password that access operation information is previously stored with server OS, so, peace Full checking equipment can obtain the username and password for prestoring from the server OS;Judge that described first steps on Whether the user name carried in record request and the password are consistent with the user name and the password for obtaining.
When the username and password carried in the first logging request is obtained with security verification device from server OS When the username and password for taking is consistent, then illustrate that the username and password carried in the first logging request is correct, can be by testing Card.
S103:After being verified, then according to the contact details of the keeper, sent out to the corresponding equipment of the contact details Send identifying code.
In view of in actual applications, the username and password that keeper is used for access server operating system may be by Other staff illegally obtain.Even if the username and password for that is being carried in the first logging request has passed through checking, but The username and password is also not necessarily the information that keeper is input on the client, it is also possible to which other staff illegally get this The input carried out after username and password, so, in order to further lift the security of keeper's access server operating system, The identity of keeper can be verified.
In embodiments of the present invention, the contact details of keeper can be prestored in security verification device, it is described It is that information can be used to indicate that keeper uses the relevant information of equipment.
The contact details can be phone number or Email Accounts of keeper etc., not limit herein.With hand As a example by machine number, specifically, security verification device can be flat by short message according to the phone number included in the contact details Platform sends the short message for carrying the identifying code to the mobile phone of the keeper.By taking Email Accounts as an example, specifically, safety verification sets It is standby to be sent to the mailbox of the keeper by mailbox platform and carried according to the Email Accounts included in the contact details The mail of the identifying code.
Wherein, the identifying code can be generated or be randomly generated by security verification device according to certain rule, This is not limited.The embodiment of the present invention is not also limited for the concrete form of identifying code, can be digital, or alphabetical Deng.
Introduced conveniently in order to follow-up, be next introduced, it is necessary to explanation so that contact details are phone number as an example It is, to ensure that the corresponding mobile phone of the phone number can normally receive the carrying identifying code of security verification device transmission Short message, before this, security verification device can set up normal communication connection with SMS platform.
S104:Receive the second logging request for accessing operating system again that client sends.
Wherein, the user name, the password and the identifying code are carried in second logging request.
In implementing, after keeper receives the identifying code of security verification device transmission, this can now be tested Card code is attached to behind the password, in this, as a new password, so as in the remote access operation system of client Interface input user name and the new password again.
In addition to aforesaid way, or after security verification device sends identifying code to the equipment that keeper is used, When keeper is input into log-on message second, the remote access operation system interface of the client is automatically updated, display User name, password and identifying code this three information are input, now can be input into for user name, password and identifying code successively by keeper To corresponding position.
S105:The user name, the password and the identifying code to being carried in second logging request are tested Card;If being proved to be successful, allow to access the server OS.
Security verification device is guarantee Admin Access's server after the second logging request for receiving client transmission The security of operating system is, it is necessary to user name, password and identifying code to being carried in the second logging request are verified.
Specifically, security verification device can obtain the user name that prestores and close from the server OS Code;
Judge the user name, the password and the identifying code that carry in second logging request whether with acquisition The user name, the password and generation the identifying code it is consistent.
The user name, password and the identifying code that include when the second logging request and security verification device are from server operation system When the identifying code of the user name, password and security verification device generation that are obtained in system is consistent, then second logging request is illustrated The user name of middle carrying, password and identifying code are correct, can be by checking, and now, it is right that keeper can be realized by client The access of the server OS.
It should be noted that in actual applications, security verification device is to the user name, close that is carried in the second logging request When code and identifying code are verified, can be set, after more than the proving time, if the second logging request the corresponding proving time The user name of middle carrying, password and identifying code are still not verified, then keeper cannot access the server OS, but Influenceed by network, communication and operation etc. are many in view of identifying code, the response time can not possibly be too fast, so, in the present invention In embodiment, what can be set the proving time is longer, for example, could be arranged to 5 minutes.For the tool of proving time Body numerical value, can be adjusted according to actual conditions, not limit herein.
Compared to the first logging request, identifying code is increased in the second logging request, even if username and password is by it His personnel illegally obtain, if not the operation that keeper is carried out, other staff are due to that cannot get the identifying code, it is impossible to pass through Verify for second, so as to the server OS cannot be accessed.
In embodiments of the present invention, in order to further lift the operating efficiency of security verification device, set in the safety verification After standby first time gets username and password from server OS, the username and password can be tested in the safety A period of time is preserved in card equipment, for example.The scheduled time can be set, in order to the security verification device to the second logging request When the user name of middle carrying, password and identifying code are verified, the username and password that can be preserved with direct basis be stepped on to second The record username and password that includes of request verified, without repeat obtained from server OS the user name and The operation of password.The length of the scheduled time, can be configured according to the actual requirements, not limit herein.When the scheduled time After end, the username and password preserved in the safety means can be automatically deleted, to ensure the important informations such as username and password Security.
By above-mentioned technical proposal as can be seen that by installing security verification device in server OS, the safety The contact details of keeper are previously stored with checking equipment, are being operated for access server for client transmission is received After first logging request of system, username and password is carried in first logging request;To in first logging request The user name and the password for carrying are verified;After being verified, then according to the contact details of the keeper, to institute State the corresponding equipment of contact details and send identifying code;Receiving for accessing operating system again the second of client transmission After logging request, the user name, the password and the identifying code are carried in second logging request;To described second The user name, the password and the identifying code carried in logging request are verified;If being proved to be successful, allow to access The server OS.It can be seen that, by safety verification twice, checking for the first time can ensure the correctness of log-on message, For the second time it is verified the mode of addition dynamic verification code, it is to avoid when log-on message is obtained by other staff by improper means Rear unauthorized access server OS is taken, the harm caused to server OS effectively improves Admin Access The security of server OS.
Fig. 2 is a kind of structural representation of the device of access server operating system provided in an embodiment of the present invention, application In security verification device, the security verification device is installed on the server OS, in the security verification device The contact details of keeper are previously stored with, described device includes receiving unit 21, authentication unit 22 and transmitting element 23:
The receiving unit 21, the first login for access server operating system for receiving client transmission please Ask, username and password is carried in first logging request.
The authentication unit 22, for being carried out to the user name and the password that are carried in first logging request Checking.
After being verified, then the transmitting element 23, the transmitting element 23, for the connection according to the keeper are triggered It is information, identifying code is sent to the corresponding equipment of the contact details;
The for accessing operating system again second login that the receiving unit 21 is additionally operable to receive client transmission please Ask, the user name, the password and the identifying code are carried in second logging request.
The authentication unit 22 is additionally operable to the user name, the password and institute to being carried in second logging request Identifying code is stated to be verified;If being proved to be successful, allow to access the server OS.
Optionally, the authentication unit includes obtaining subelement and judgment sub-unit:
The acquisition subelement, for obtaining the username and password for prestoring from the server OS;
The judgment sub-unit, the user name and the password for judging to be carried in first logging request are It is no consistent with the user name for obtaining and the password.
Optionally, the transmitting element is specifically for according to the phone number included in the contact details, by short message Platform sends the short message for carrying the identifying code to the mobile phone of the keeper.
Optionally, the transmitting element is specifically for according to the Email Accounts included in the contact details, by mailbox Platform sends the mail for carrying the identifying code to the mailbox of the keeper.
Optionally, the authentication unit includes obtaining subelement and judgment sub-unit:
The acquisition subelement, for obtaining the username and password for prestoring from the server OS;
The judgment sub-unit, for judge to carry in second logging request the user name, the password and Whether the identifying code is consistent with the identifying code of the user name, the password and generation that obtain.
The explanation of feature may refer to the related description of embodiment corresponding to Fig. 1 in embodiment corresponding to Fig. 2, here no longer Repeat one by one.
A kind of method and apparatus of access server operating system provided by the present invention is described in detail above. Each embodiment is described by the way of progressive in specification, and what each embodiment was stressed is with other embodiment not Same part, between each embodiment identical similar portion mutually referring to.For device disclosed in embodiment, due to it Correspond to the method disclosed in Example, so description is fairly simple, related part is referring to method part illustration.Should Point out, for those skilled in the art, under the premise without departing from the principles of the invention, can also be to this hair Bright to carry out some improvement and modification, these are improved and modification is also fallen into the protection domain of the claims in the present invention.
Professional further appreciates that, with reference to the unit of each example of the embodiments described herein description And algorithm steps, can be realized with electronic hardware, computer software or the combination of the two, in order to clearly demonstrate hardware and The interchangeability of software, generally describes the composition and step of each example according to function in the above description.These Function is performed with hardware or software mode actually, depending on the application-specific and design constraint of technical scheme.Specialty Technical staff can realize described function to each specific application using distinct methods, but this realization should not Think beyond the scope of this invention.
The step of method or algorithm for being described with reference to the embodiments described herein, directly can be held with hardware, processor Capable software module, or the two combination is implemented.Software module can be placed in random access memory (RAM), internal memory, read-only deposit Reservoir (ROM), electrically programmable ROM, electrically erasable ROM, register, hard disk, moveable magnetic disc, CD-ROM or technology In field in known any other form of storage medium.

Claims (10)

1. a kind of method of access server operating system, it is characterised in that be applied to security verification device, the safety verification Equipment is installed on the server OS, and the contact details of keeper are previously stored with the security verification device, Methods described includes:
The first logging request for access server operating system that client sends is received, in first logging request Carry username and password;
The user name and the password to being carried in first logging request are verified;
After being verified, then according to the contact details of the keeper, identifying code is sent to the corresponding equipment of the contact details;
The second logging request for accessing operating system again that client sends is received, is taken in second logging request With the user name, the password and the identifying code;
The user name, the password and the identifying code to being carried in second logging request are verified;If checking Success, then allow to access the server OS.
2. method according to claim 1, it is characterised in that the use to being carried in first logging request Name in an account book and the password carry out checking to be included:
The username and password for prestoring is obtained from the server OS;
Judge the user name that carries in first logging request and the password whether with the user name for obtaining and The password is consistent.
3. method according to claim 2, it is characterised in that the contact details according to the keeper, to described The corresponding equipment of contact details sends identifying code to be included:
According to the phone number included in the contact details, sent to the mobile phone of the keeper by SMS platform and carry institute State the short message of identifying code.
4. method according to claim 2, it is characterised in that the contact details according to the keeper, to described The corresponding equipment of contact details sends identifying code to be included:
According to the Email Accounts included in the contact details, sent to the mailbox of the keeper by mailbox platform and carry institute State the mail of identifying code.
5. the method according to claim 1-4 any one, it is characterised in that described to being taken in second logging request The user name of band, the password and the identifying code carry out checking and include:
The username and password for prestoring is obtained from the server OS;
Judge the user name, the password and the identifying code that carry in second logging request whether with the institute for obtaining The identifying code for stating user name, the password and generation is consistent.
6. a kind of device of access server operating system, it is characterised in that be applied to security verification device, the safety verification Equipment is installed on the server OS, and the contact details of keeper are previously stored with the security verification device, Described device includes receiving unit, authentication unit and transmitting element:
The receiving unit, the first logging request for access server operating system for receiving client transmission, Username and password is carried in first logging request;
The authentication unit, for being verified to the user name and the password that are carried in first logging request;
After being verified, then the transmitting element is triggered, the transmitting element, for the contact details according to the keeper, Identifying code is sent to the corresponding equipment of the contact details;
The receiving unit is additionally operable to receive the second logging request for accessing operating system again that client sends, in institute State and carry the user name, the password and the identifying code in the second logging request;
The authentication unit is additionally operable to the user name, the password and the checking to being carried in second logging request Code is verified;If being proved to be successful, allow to access the server OS.
7. device according to claim 6, it is characterised in that the authentication unit includes obtaining subelement and judges that son is single Unit:
The acquisition subelement, for obtaining the username and password for prestoring from the server OS;
The judgment sub-unit, for the user name for judging to carry in first logging request and the password whether with The user name for obtaining is consistent with the password.
8. device according to claim 7, it is characterised in that the transmitting element is specifically for according to the contact details In the phone number that includes, the short message for carrying the identifying code is sent to the mobile phone of the keeper by SMS platform.
9. device according to claim 7, it is characterised in that the transmitting element is specifically for according to the contact details In the Email Accounts that includes, the mail for carrying the identifying code is sent to the mailbox of the keeper by mailbox platform.
10. the device according to claim 6-9 any one, it is characterised in that the authentication unit includes obtaining son single Unit and judgment sub-unit:
The acquisition subelement, for obtaining the username and password for prestoring from the server OS;
The judgment sub-unit, for the user name, the password and described that judge to carry in second logging request Whether identifying code is consistent with the identifying code of the user name, the password and generation that obtain.
CN201710075885.5A 2017-02-13 2017-02-13 A kind of method and apparatus of access server operating system Pending CN106790267A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710075885.5A CN106790267A (en) 2017-02-13 2017-02-13 A kind of method and apparatus of access server operating system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710075885.5A CN106790267A (en) 2017-02-13 2017-02-13 A kind of method and apparatus of access server operating system

Publications (1)

Publication Number Publication Date
CN106790267A true CN106790267A (en) 2017-05-31

Family

ID=58956413

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710075885.5A Pending CN106790267A (en) 2017-02-13 2017-02-13 A kind of method and apparatus of access server operating system

Country Status (1)

Country Link
CN (1) CN106790267A (en)

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107147661A (en) * 2017-06-01 2017-09-08 郑州云海信息技术有限公司 One kind strengthens File Transfer Protocol security system and method based on dynamic password
CN107257302A (en) * 2017-08-18 2017-10-17 郑州云海信息技术有限公司 It is a kind of to strengthen the method and system of snmp protocol safety
CN107347080A (en) * 2017-09-05 2017-11-14 郑州云海信息技术有限公司 A kind of method based on dynamic password enhancing serial port protocol safety
CN107370765A (en) * 2017-09-06 2017-11-21 郑州云海信息技术有限公司 A kind of ftp server identity identifying method and system
CN107371162A (en) * 2017-09-12 2017-11-21 郑州云海信息技术有限公司 A kind of method and system based on dynamic password enhancing wap protocol safety
CN107566396A (en) * 2017-09-28 2018-01-09 郑州云海信息技术有限公司 A kind of method based on dynamic password enhancing server VPN protocol securitys
CN108566391A (en) * 2018-03-30 2018-09-21 阿里巴巴集团控股有限公司 A kind of login method and device of internet of things equipment
CN109617230A (en) * 2018-12-06 2019-04-12 贵州电网有限责任公司 The implementation method of exchange system secure configuration management in a kind of electrical power services device
CN110401674A (en) * 2019-08-19 2019-11-01 泰康保险集团股份有限公司 Data access method, device, system, electronic equipment and computer-readable medium
CN111083124A (en) * 2019-12-02 2020-04-28 中国联合网络通信集团有限公司 Cloud fortress login method and device
CN111181941A (en) * 2019-12-23 2020-05-19 杭州安恒信息技术股份有限公司 Page login method, system and related device
CN112615828A (en) * 2020-12-08 2021-04-06 浙江启博知识产权运营有限公司 Intellectual property operating system based on cloud computing network and intelligent authorization method
CN113827983A (en) * 2021-09-24 2021-12-24 深圳市白日梦网络科技有限公司 Method and device for interaction between operating system and game application
EP4002806A1 (en) * 2020-11-17 2022-05-25 Shenzhen Sekorm Component Network Co., Ltd Business official email box based b2b service security verification method, apparatus, and server
CN115134766A (en) * 2022-05-18 2022-09-30 北京华融兴霁电子科技开发有限公司 Short message-based machine room safety management method, system, medium and equipment

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101034988A (en) * 2007-02-15 2007-09-12 张仁平 Network login authentication protection device and its using method
CN102546914A (en) * 2010-12-27 2012-07-04 梁志龙 Automatic login system based on smart phone and control method
CN103747013A (en) * 2014-01-24 2014-04-23 沈文策 Cloud terminal login verification method and device
CN104751032A (en) * 2013-12-31 2015-07-01 腾讯科技(深圳)有限公司 Authentication method and authentication device
CN105262774A (en) * 2015-11-11 2016-01-20 浪潮(北京)电子信息产业有限公司 Remote login method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101034988A (en) * 2007-02-15 2007-09-12 张仁平 Network login authentication protection device and its using method
CN102546914A (en) * 2010-12-27 2012-07-04 梁志龙 Automatic login system based on smart phone and control method
CN104751032A (en) * 2013-12-31 2015-07-01 腾讯科技(深圳)有限公司 Authentication method and authentication device
CN103747013A (en) * 2014-01-24 2014-04-23 沈文策 Cloud terminal login verification method and device
CN105262774A (en) * 2015-11-11 2016-01-20 浪潮(北京)电子信息产业有限公司 Remote login method

Cited By (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107147661A (en) * 2017-06-01 2017-09-08 郑州云海信息技术有限公司 One kind strengthens File Transfer Protocol security system and method based on dynamic password
CN107257302A (en) * 2017-08-18 2017-10-17 郑州云海信息技术有限公司 It is a kind of to strengthen the method and system of snmp protocol safety
CN107347080A (en) * 2017-09-05 2017-11-14 郑州云海信息技术有限公司 A kind of method based on dynamic password enhancing serial port protocol safety
CN107370765A (en) * 2017-09-06 2017-11-21 郑州云海信息技术有限公司 A kind of ftp server identity identifying method and system
CN107371162A (en) * 2017-09-12 2017-11-21 郑州云海信息技术有限公司 A kind of method and system based on dynamic password enhancing wap protocol safety
CN107566396A (en) * 2017-09-28 2018-01-09 郑州云海信息技术有限公司 A kind of method based on dynamic password enhancing server VPN protocol securitys
TWI688245B (en) * 2018-03-30 2020-03-11 香港商阿里巴巴集團服務有限公司 Login method and device of internet of things equipment
CN108566391B (en) * 2018-03-30 2020-05-12 阿里巴巴集团控股有限公司 Login method and device for Internet of things equipment
WO2019184599A1 (en) * 2018-03-30 2019-10-03 阿里巴巴集团控股有限公司 Login method and apparatus for internet-of-things device
CN108566391A (en) * 2018-03-30 2018-09-21 阿里巴巴集团控股有限公司 A kind of login method and device of internet of things equipment
CN109617230A (en) * 2018-12-06 2019-04-12 贵州电网有限责任公司 The implementation method of exchange system secure configuration management in a kind of electrical power services device
CN110401674A (en) * 2019-08-19 2019-11-01 泰康保险集团股份有限公司 Data access method, device, system, electronic equipment and computer-readable medium
CN111083124B (en) * 2019-12-02 2022-03-01 中国联合网络通信集团有限公司 Cloud fortress login method and device
CN111083124A (en) * 2019-12-02 2020-04-28 中国联合网络通信集团有限公司 Cloud fortress login method and device
CN111181941A (en) * 2019-12-23 2020-05-19 杭州安恒信息技术股份有限公司 Page login method, system and related device
CN111181941B (en) * 2019-12-23 2022-07-05 杭州安恒信息技术股份有限公司 Page login method, system and related device
EP4002806A1 (en) * 2020-11-17 2022-05-25 Shenzhen Sekorm Component Network Co., Ltd Business official email box based b2b service security verification method, apparatus, and server
CN112615828A (en) * 2020-12-08 2021-04-06 浙江启博知识产权运营有限公司 Intellectual property operating system based on cloud computing network and intelligent authorization method
CN113827983A (en) * 2021-09-24 2021-12-24 深圳市白日梦网络科技有限公司 Method and device for interaction between operating system and game application
CN115134766A (en) * 2022-05-18 2022-09-30 北京华融兴霁电子科技开发有限公司 Short message-based machine room safety management method, system, medium and equipment

Similar Documents

Publication Publication Date Title
CN106790267A (en) A kind of method and apparatus of access server operating system
CN105246073B (en) The access authentication method and server of wireless network
CN108416589A (en) Connection method, system and the computer readable storage medium of block chain node
CN104601324B (en) A kind of verification method, terminal and system for application
CN106850635A (en) A kind of method and apparatus for accessing single-set operation system
CN109784031B (en) Account identity verification processing method and device
AU2013312578A1 (en) Data security management system
CN104980926B (en) The long-range control method and device of mobile terminal
CN102571808B (en) Self-service tax terminal external network deployment method
CN103973715B (en) Cloud computing security system and method
CN109040070A (en) Document sending method, equipment and computer readable storage medium
CN101051905A (en) Agent identity certificiation method
CN107846406A (en) A kind of account logon method and device
CN105703910A (en) Dynamic password verifying method based on Wechat service number
CN102833247A (en) Method for anti-sweeping ciphers in user login system and device thereof
CN105975867A (en) Data processing method
CN104468486B (en) Information processing method, system and electronic equipment
CN106161710A (en) A kind of user account safety management system based on smart mobile phone
CN106656992A (en) Information verification method
CN109981677A (en) A kind of credit management method and device
CN102413146A (en) Client authorized logon method based on dynamic codes
CN101854357B (en) Method and system for monitoring network authentication
CN103559430B (en) application account management method and device based on Android system
CN110351296B (en) Application login method and device and related equipment thereof
CN103177203A (en) Computer login management system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20170531

RJ01 Rejection of invention patent application after publication