CN106790267A - A kind of method and apparatus of access server operating system - Google Patents
A kind of method and apparatus of access server operating system Download PDFInfo
- Publication number
- CN106790267A CN106790267A CN201710075885.5A CN201710075885A CN106790267A CN 106790267 A CN106790267 A CN 106790267A CN 201710075885 A CN201710075885 A CN 201710075885A CN 106790267 A CN106790267 A CN 106790267A
- Authority
- CN
- China
- Prior art keywords
- password
- logging request
- identifying code
- user name
- server
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0815—Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
Abstract
The embodiment of the invention discloses a kind of method and apparatus of access server operating system, security verification device is installed in server OS, the contact details of keeper are previously stored with the security verification device, after the first logging request for access server operating system for receiving client transmission, username and password is carried in the first logging request;Username and password to being carried in the first logging request is verified;After being verified, then according to the contact details of keeper, identifying code is sent to the corresponding equipment of contact details;Receive client transmission for access operating system again the second logging request after, user name, password and identifying code are carried in the second logging request;User name, password and identifying code to being carried in the second logging request are verified;If being proved to be successful, allow to access the server OS.By safety verification twice, the security of Admin Access's server OS is effectively improved.
Description
Technical field
The present invention relates to field of computer technology, more particularly to a kind of method of access server operating system and dress
Put.
Background technology
Server is all in use, to be in most cases deployed in computer room in batch, due to large number of, it is entered
Row management, traditional unit way to manage is obviously unsuitable.It is right that usual keeper can be realized by the way of remote control
The management of server.With the popularization and application and the fast development of network technology of computer technology, information security has turned into society
The serious problems of each field common concern.Used as the foundation stone of information security, the security of operating system turns into academia naturally
Study hotspot.
In traditional approach, keeper can be used in safety shell protocol (Secure Shell, SSH) client by being input into
The mode of name in an account book and password, enters into the administration interface of the server, realizes the access to server OS, and keeper is not
Must be in the action, the management to server can be achieved with by remote control.But once username and password is by other staff
It is illegal to obtain, the safety of server OS may be threatened.
It can be seen that, the security of keeper's access server operating system how is lifted, it is that those skilled in the art urgently solve
Problem certainly.
The content of the invention
The purpose of the embodiment of the present invention is to provide a kind of method and apparatus of access server operating system, can effectively carry
Rise the security of keeper's access server operating system.
In order to solve the above technical problems, the embodiment of the present invention provides a kind of method of access server operating system, application
In security verification device, the security verification device is installed on the server OS, in the security verification device
The contact details of keeper are previously stored with, methods described includes:
The first logging request for access server operating system that client sends is received, being logged in described first please
Username and password is carried in asking;
The user name and the password to being carried in first logging request are verified;
After being verified, then according to the contact details of the keeper, sent to the corresponding equipment of the contact details and tested
Card code;
The second logging request for accessing operating system again that client sends is received, in second logging request
In carry the user name, the password and the identifying code;
The user name, the password and the identifying code to being carried in second logging request are verified;If
It is proved to be successful, then allows to access the server OS.
Optionally, the user name and the password to being carried in first logging request carries out checking bag
Include:
The username and password for prestoring is obtained from the server OS;
Judge the user name that carries in first logging request and the password whether with the user for obtaining
Name is consistent with the password.
Optionally, the contact details according to the keeper, checking is sent to the corresponding equipment of the contact details
Code includes:
According to the phone number included in the contact details, sent to the mobile phone of the keeper by SMS platform and taken
Short message with the identifying code.
Optionally, the contact details according to the keeper, checking is sent to the corresponding equipment of the contact details
Code includes:
According to the Email Accounts included in the contact details, sent to the mailbox of the keeper by mailbox platform and taken
Mail with the identifying code.
Optionally, the user name, the password and the identifying code to being carried in second logging request
Carrying out checking includes:
The username and password for prestoring is obtained from the server OS;
Judge the user name, the password and the identifying code that carry in second logging request whether with acquisition
The user name, the password and generation the identifying code it is consistent.
The embodiment of the present invention also provides a kind of device of access server operating system, is applied to security verification device, institute
State security verification device and be installed on the server OS, be previously stored with keeper's in the security verification device
Contact details, described device includes receiving unit, authentication unit and transmitting element:
The receiving unit, the first login for access server operating system for receiving client transmission please
Ask, username and password is carried in first logging request;
The authentication unit, for testing the user name and the password that are carried in first logging request
Card;
After being verified, then the transmitting element is triggered, the transmitting element is believed for the contact according to the keeper
Breath, identifying code is sent to the corresponding equipment of the contact details;
The receiving unit is additionally operable to receive the second logging request for accessing operating system again that client sends,
The user name, the password and the identifying code are carried in second logging request;
The authentication unit is additionally operable to the user name, the password and described to being carried in second logging request
Identifying code is verified;If being proved to be successful, allow to access the server OS.
Optionally, the authentication unit includes obtaining subelement and judgment sub-unit:
The acquisition subelement, for obtaining the username and password for prestoring from the server OS;
The judgment sub-unit, the user name and the password for judging to be carried in first logging request are
It is no consistent with the user name for obtaining and the password.
Optionally, the transmitting element is specifically for according to the phone number included in the contact details, by short message
Platform sends the short message for carrying the identifying code to the mobile phone of the keeper.
Optionally, the transmitting element is specifically for according to the Email Accounts included in the contact details, by mailbox
Platform sends the mail for carrying the identifying code to the mailbox of the keeper.
Optionally, the authentication unit includes obtaining subelement and judgment sub-unit:
The acquisition subelement, for obtaining the username and password for prestoring from the server OS;
The judgment sub-unit, for judge to carry in second logging request the user name, the password and
Whether the identifying code is consistent with the identifying code of the user name, the password and generation that obtain.
By above-mentioned technical proposal as can be seen that by installing security verification device in server OS, the safety
The contact details of keeper are previously stored with checking equipment, are being operated for access server for client transmission is received
After first logging request of system, username and password is carried in first logging request;To in first logging request
The user name and the password for carrying are verified;After being verified, then according to the contact details of the keeper, to institute
State the corresponding equipment of contact details and send identifying code;Receiving for accessing operating system again the second of client transmission
After logging request, the user name, the password and the identifying code are carried in second logging request;To described second
The user name, the password and the identifying code carried in logging request are verified;If being proved to be successful, allow to access
The server OS.It can be seen that, by safety verification twice, checking for the first time can ensure the correctness of log-on message,
For the second time it is verified the mode of addition dynamic verification code, it is to avoid when log-on message is obtained by other staff by improper means
Rear unauthorized access server OS is taken, the harm caused to server OS effectively improves Admin Access
The security of server OS.
Brief description of the drawings
In order to illustrate more clearly the embodiments of the present invention, the accompanying drawing to be used needed for embodiment will be done simply below
Introduce, it should be apparent that, drawings in the following description are only some embodiments of the present invention, for ordinary skill people
For member, on the premise of not paying creative work, other accompanying drawings can also be obtained according to these accompanying drawings.
Fig. 1 is a kind of flow chart of the method for access server operating system provided in an embodiment of the present invention;
Fig. 2 is a kind of structural representation of the device of access server operating system provided in an embodiment of the present invention.
Specific embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete
Site preparation is described, it is clear that described embodiment is only a part of embodiment of the invention, rather than whole embodiments.Based on this
Embodiment in invention, those of ordinary skill in the art are not under the premise of creative work is made, and what is obtained is every other
Embodiment, belongs to the scope of the present invention.
In order that those skilled in the art more fully understand the present invention program, with reference to the accompanying drawings and detailed description
The present invention is described in further detail.
Next, the method that a kind of access server operating system that the embodiment of the present invention is provided is discussed in detail.Fig. 1 is
A kind of flow chart of the method for access server operating system provided in an embodiment of the present invention, is applied to security verification device, institute
State security verification device and be installed on the server OS, be previously stored with keeper's in the security verification device
Contact details, methods described includes:
S101:Receive the first logging request for access server operating system that client sends;Described first
Username and password is carried in logging request.
Client can be the equipment that proper communication is realized with the server OS, and keeper can be by client
Realize the remote management to server OS.In embodiments of the present invention, client can specifically use ssh client.
By taking a server as an example, remote management, keeper are carried out to the server OS for the ease of keeper
The operating system can be accessed by way of being input into username and password in corresponding client.In order to ensure server operation
The security of system, username and password only keeper possess.
In implementing, keeper can input user name and close in the remote access operation system interface of client
Code, after client receives the username and password of keeper's input, just can send first and log in server OS
Request, username and password can be carried in first logging request.
In embodiments of the present invention, security verification device, user end to server behaviour are installed in server OS
The first logging request for making system transmission can be by the security verification device direct access.
S102:The user name and the password to being carried in first logging request are verified.
Security verification device after the first logging request is received, for the user name for ensureing to carry in the first logging request
With the correctness of password, it is necessary to be verified to the username and password.
In view of the username and password that access operation information is previously stored with server OS, so, peace
Full checking equipment can obtain the username and password for prestoring from the server OS;Judge that described first steps on
Whether the user name carried in record request and the password are consistent with the user name and the password for obtaining.
When the username and password carried in the first logging request is obtained with security verification device from server OS
When the username and password for taking is consistent, then illustrate that the username and password carried in the first logging request is correct, can be by testing
Card.
S103:After being verified, then according to the contact details of the keeper, sent out to the corresponding equipment of the contact details
Send identifying code.
In view of in actual applications, the username and password that keeper is used for access server operating system may be by
Other staff illegally obtain.Even if the username and password for that is being carried in the first logging request has passed through checking, but
The username and password is also not necessarily the information that keeper is input on the client, it is also possible to which other staff illegally get this
The input carried out after username and password, so, in order to further lift the security of keeper's access server operating system,
The identity of keeper can be verified.
In embodiments of the present invention, the contact details of keeper can be prestored in security verification device, it is described
It is that information can be used to indicate that keeper uses the relevant information of equipment.
The contact details can be phone number or Email Accounts of keeper etc., not limit herein.With hand
As a example by machine number, specifically, security verification device can be flat by short message according to the phone number included in the contact details
Platform sends the short message for carrying the identifying code to the mobile phone of the keeper.By taking Email Accounts as an example, specifically, safety verification sets
It is standby to be sent to the mailbox of the keeper by mailbox platform and carried according to the Email Accounts included in the contact details
The mail of the identifying code.
Wherein, the identifying code can be generated or be randomly generated by security verification device according to certain rule,
This is not limited.The embodiment of the present invention is not also limited for the concrete form of identifying code, can be digital, or alphabetical
Deng.
Introduced conveniently in order to follow-up, be next introduced, it is necessary to explanation so that contact details are phone number as an example
It is, to ensure that the corresponding mobile phone of the phone number can normally receive the carrying identifying code of security verification device transmission
Short message, before this, security verification device can set up normal communication connection with SMS platform.
S104:Receive the second logging request for accessing operating system again that client sends.
Wherein, the user name, the password and the identifying code are carried in second logging request.
In implementing, after keeper receives the identifying code of security verification device transmission, this can now be tested
Card code is attached to behind the password, in this, as a new password, so as in the remote access operation system of client
Interface input user name and the new password again.
In addition to aforesaid way, or after security verification device sends identifying code to the equipment that keeper is used,
When keeper is input into log-on message second, the remote access operation system interface of the client is automatically updated, display
User name, password and identifying code this three information are input, now can be input into for user name, password and identifying code successively by keeper
To corresponding position.
S105:The user name, the password and the identifying code to being carried in second logging request are tested
Card;If being proved to be successful, allow to access the server OS.
Security verification device is guarantee Admin Access's server after the second logging request for receiving client transmission
The security of operating system is, it is necessary to user name, password and identifying code to being carried in the second logging request are verified.
Specifically, security verification device can obtain the user name that prestores and close from the server OS
Code;
Judge the user name, the password and the identifying code that carry in second logging request whether with acquisition
The user name, the password and generation the identifying code it is consistent.
The user name, password and the identifying code that include when the second logging request and security verification device are from server operation system
When the identifying code of the user name, password and security verification device generation that are obtained in system is consistent, then second logging request is illustrated
The user name of middle carrying, password and identifying code are correct, can be by checking, and now, it is right that keeper can be realized by client
The access of the server OS.
It should be noted that in actual applications, security verification device is to the user name, close that is carried in the second logging request
When code and identifying code are verified, can be set, after more than the proving time, if the second logging request the corresponding proving time
The user name of middle carrying, password and identifying code are still not verified, then keeper cannot access the server OS, but
Influenceed by network, communication and operation etc. are many in view of identifying code, the response time can not possibly be too fast, so, in the present invention
In embodiment, what can be set the proving time is longer, for example, could be arranged to 5 minutes.For the tool of proving time
Body numerical value, can be adjusted according to actual conditions, not limit herein.
Compared to the first logging request, identifying code is increased in the second logging request, even if username and password is by it
His personnel illegally obtain, if not the operation that keeper is carried out, other staff are due to that cannot get the identifying code, it is impossible to pass through
Verify for second, so as to the server OS cannot be accessed.
In embodiments of the present invention, in order to further lift the operating efficiency of security verification device, set in the safety verification
After standby first time gets username and password from server OS, the username and password can be tested in the safety
A period of time is preserved in card equipment, for example.The scheduled time can be set, in order to the security verification device to the second logging request
When the user name of middle carrying, password and identifying code are verified, the username and password that can be preserved with direct basis be stepped on to second
The record username and password that includes of request verified, without repeat obtained from server OS the user name and
The operation of password.The length of the scheduled time, can be configured according to the actual requirements, not limit herein.When the scheduled time
After end, the username and password preserved in the safety means can be automatically deleted, to ensure the important informations such as username and password
Security.
By above-mentioned technical proposal as can be seen that by installing security verification device in server OS, the safety
The contact details of keeper are previously stored with checking equipment, are being operated for access server for client transmission is received
After first logging request of system, username and password is carried in first logging request;To in first logging request
The user name and the password for carrying are verified;After being verified, then according to the contact details of the keeper, to institute
State the corresponding equipment of contact details and send identifying code;Receiving for accessing operating system again the second of client transmission
After logging request, the user name, the password and the identifying code are carried in second logging request;To described second
The user name, the password and the identifying code carried in logging request are verified;If being proved to be successful, allow to access
The server OS.It can be seen that, by safety verification twice, checking for the first time can ensure the correctness of log-on message,
For the second time it is verified the mode of addition dynamic verification code, it is to avoid when log-on message is obtained by other staff by improper means
Rear unauthorized access server OS is taken, the harm caused to server OS effectively improves Admin Access
The security of server OS.
Fig. 2 is a kind of structural representation of the device of access server operating system provided in an embodiment of the present invention, application
In security verification device, the security verification device is installed on the server OS, in the security verification device
The contact details of keeper are previously stored with, described device includes receiving unit 21, authentication unit 22 and transmitting element 23:
The receiving unit 21, the first login for access server operating system for receiving client transmission please
Ask, username and password is carried in first logging request.
The authentication unit 22, for being carried out to the user name and the password that are carried in first logging request
Checking.
After being verified, then the transmitting element 23, the transmitting element 23, for the connection according to the keeper are triggered
It is information, identifying code is sent to the corresponding equipment of the contact details;
The for accessing operating system again second login that the receiving unit 21 is additionally operable to receive client transmission please
Ask, the user name, the password and the identifying code are carried in second logging request.
The authentication unit 22 is additionally operable to the user name, the password and institute to being carried in second logging request
Identifying code is stated to be verified;If being proved to be successful, allow to access the server OS.
Optionally, the authentication unit includes obtaining subelement and judgment sub-unit:
The acquisition subelement, for obtaining the username and password for prestoring from the server OS;
The judgment sub-unit, the user name and the password for judging to be carried in first logging request are
It is no consistent with the user name for obtaining and the password.
Optionally, the transmitting element is specifically for according to the phone number included in the contact details, by short message
Platform sends the short message for carrying the identifying code to the mobile phone of the keeper.
Optionally, the transmitting element is specifically for according to the Email Accounts included in the contact details, by mailbox
Platform sends the mail for carrying the identifying code to the mailbox of the keeper.
Optionally, the authentication unit includes obtaining subelement and judgment sub-unit:
The acquisition subelement, for obtaining the username and password for prestoring from the server OS;
The judgment sub-unit, for judge to carry in second logging request the user name, the password and
Whether the identifying code is consistent with the identifying code of the user name, the password and generation that obtain.
The explanation of feature may refer to the related description of embodiment corresponding to Fig. 1 in embodiment corresponding to Fig. 2, here no longer
Repeat one by one.
A kind of method and apparatus of access server operating system provided by the present invention is described in detail above.
Each embodiment is described by the way of progressive in specification, and what each embodiment was stressed is with other embodiment not
Same part, between each embodiment identical similar portion mutually referring to.For device disclosed in embodiment, due to it
Correspond to the method disclosed in Example, so description is fairly simple, related part is referring to method part illustration.Should
Point out, for those skilled in the art, under the premise without departing from the principles of the invention, can also be to this hair
Bright to carry out some improvement and modification, these are improved and modification is also fallen into the protection domain of the claims in the present invention.
Professional further appreciates that, with reference to the unit of each example of the embodiments described herein description
And algorithm steps, can be realized with electronic hardware, computer software or the combination of the two, in order to clearly demonstrate hardware and
The interchangeability of software, generally describes the composition and step of each example according to function in the above description.These
Function is performed with hardware or software mode actually, depending on the application-specific and design constraint of technical scheme.Specialty
Technical staff can realize described function to each specific application using distinct methods, but this realization should not
Think beyond the scope of this invention.
The step of method or algorithm for being described with reference to the embodiments described herein, directly can be held with hardware, processor
Capable software module, or the two combination is implemented.Software module can be placed in random access memory (RAM), internal memory, read-only deposit
Reservoir (ROM), electrically programmable ROM, electrically erasable ROM, register, hard disk, moveable magnetic disc, CD-ROM or technology
In field in known any other form of storage medium.
Claims (10)
1. a kind of method of access server operating system, it is characterised in that be applied to security verification device, the safety verification
Equipment is installed on the server OS, and the contact details of keeper are previously stored with the security verification device,
Methods described includes:
The first logging request for access server operating system that client sends is received, in first logging request
Carry username and password;
The user name and the password to being carried in first logging request are verified;
After being verified, then according to the contact details of the keeper, identifying code is sent to the corresponding equipment of the contact details;
The second logging request for accessing operating system again that client sends is received, is taken in second logging request
With the user name, the password and the identifying code;
The user name, the password and the identifying code to being carried in second logging request are verified;If checking
Success, then allow to access the server OS.
2. method according to claim 1, it is characterised in that the use to being carried in first logging request
Name in an account book and the password carry out checking to be included:
The username and password for prestoring is obtained from the server OS;
Judge the user name that carries in first logging request and the password whether with the user name for obtaining and
The password is consistent.
3. method according to claim 2, it is characterised in that the contact details according to the keeper, to described
The corresponding equipment of contact details sends identifying code to be included:
According to the phone number included in the contact details, sent to the mobile phone of the keeper by SMS platform and carry institute
State the short message of identifying code.
4. method according to claim 2, it is characterised in that the contact details according to the keeper, to described
The corresponding equipment of contact details sends identifying code to be included:
According to the Email Accounts included in the contact details, sent to the mailbox of the keeper by mailbox platform and carry institute
State the mail of identifying code.
5. the method according to claim 1-4 any one, it is characterised in that described to being taken in second logging request
The user name of band, the password and the identifying code carry out checking and include:
The username and password for prestoring is obtained from the server OS;
Judge the user name, the password and the identifying code that carry in second logging request whether with the institute for obtaining
The identifying code for stating user name, the password and generation is consistent.
6. a kind of device of access server operating system, it is characterised in that be applied to security verification device, the safety verification
Equipment is installed on the server OS, and the contact details of keeper are previously stored with the security verification device,
Described device includes receiving unit, authentication unit and transmitting element:
The receiving unit, the first logging request for access server operating system for receiving client transmission,
Username and password is carried in first logging request;
The authentication unit, for being verified to the user name and the password that are carried in first logging request;
After being verified, then the transmitting element is triggered, the transmitting element, for the contact details according to the keeper,
Identifying code is sent to the corresponding equipment of the contact details;
The receiving unit is additionally operable to receive the second logging request for accessing operating system again that client sends, in institute
State and carry the user name, the password and the identifying code in the second logging request;
The authentication unit is additionally operable to the user name, the password and the checking to being carried in second logging request
Code is verified;If being proved to be successful, allow to access the server OS.
7. device according to claim 6, it is characterised in that the authentication unit includes obtaining subelement and judges that son is single
Unit:
The acquisition subelement, for obtaining the username and password for prestoring from the server OS;
The judgment sub-unit, for the user name for judging to carry in first logging request and the password whether with
The user name for obtaining is consistent with the password.
8. device according to claim 7, it is characterised in that the transmitting element is specifically for according to the contact details
In the phone number that includes, the short message for carrying the identifying code is sent to the mobile phone of the keeper by SMS platform.
9. device according to claim 7, it is characterised in that the transmitting element is specifically for according to the contact details
In the Email Accounts that includes, the mail for carrying the identifying code is sent to the mailbox of the keeper by mailbox platform.
10. the device according to claim 6-9 any one, it is characterised in that the authentication unit includes obtaining son single
Unit and judgment sub-unit:
The acquisition subelement, for obtaining the username and password for prestoring from the server OS;
The judgment sub-unit, for the user name, the password and described that judge to carry in second logging request
Whether identifying code is consistent with the identifying code of the user name, the password and generation that obtain.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710075885.5A CN106790267A (en) | 2017-02-13 | 2017-02-13 | A kind of method and apparatus of access server operating system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710075885.5A CN106790267A (en) | 2017-02-13 | 2017-02-13 | A kind of method and apparatus of access server operating system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106790267A true CN106790267A (en) | 2017-05-31 |
Family
ID=58956413
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710075885.5A Pending CN106790267A (en) | 2017-02-13 | 2017-02-13 | A kind of method and apparatus of access server operating system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106790267A (en) |
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107147661A (en) * | 2017-06-01 | 2017-09-08 | 郑州云海信息技术有限公司 | One kind strengthens File Transfer Protocol security system and method based on dynamic password |
CN107257302A (en) * | 2017-08-18 | 2017-10-17 | 郑州云海信息技术有限公司 | It is a kind of to strengthen the method and system of snmp protocol safety |
CN107347080A (en) * | 2017-09-05 | 2017-11-14 | 郑州云海信息技术有限公司 | A kind of method based on dynamic password enhancing serial port protocol safety |
CN107370765A (en) * | 2017-09-06 | 2017-11-21 | 郑州云海信息技术有限公司 | A kind of ftp server identity identifying method and system |
CN107371162A (en) * | 2017-09-12 | 2017-11-21 | 郑州云海信息技术有限公司 | A kind of method and system based on dynamic password enhancing wap protocol safety |
CN107566396A (en) * | 2017-09-28 | 2018-01-09 | 郑州云海信息技术有限公司 | A kind of method based on dynamic password enhancing server VPN protocol securitys |
CN108566391A (en) * | 2018-03-30 | 2018-09-21 | 阿里巴巴集团控股有限公司 | A kind of login method and device of internet of things equipment |
CN109617230A (en) * | 2018-12-06 | 2019-04-12 | 贵州电网有限责任公司 | The implementation method of exchange system secure configuration management in a kind of electrical power services device |
CN110401674A (en) * | 2019-08-19 | 2019-11-01 | 泰康保险集团股份有限公司 | Data access method, device, system, electronic equipment and computer-readable medium |
CN111083124A (en) * | 2019-12-02 | 2020-04-28 | 中国联合网络通信集团有限公司 | Cloud fortress login method and device |
CN111181941A (en) * | 2019-12-23 | 2020-05-19 | 杭州安恒信息技术股份有限公司 | Page login method, system and related device |
CN112615828A (en) * | 2020-12-08 | 2021-04-06 | 浙江启博知识产权运营有限公司 | Intellectual property operating system based on cloud computing network and intelligent authorization method |
CN113827983A (en) * | 2021-09-24 | 2021-12-24 | 深圳市白日梦网络科技有限公司 | Method and device for interaction between operating system and game application |
EP4002806A1 (en) * | 2020-11-17 | 2022-05-25 | Shenzhen Sekorm Component Network Co., Ltd | Business official email box based b2b service security verification method, apparatus, and server |
CN115134766A (en) * | 2022-05-18 | 2022-09-30 | 北京华融兴霁电子科技开发有限公司 | Short message-based machine room safety management method, system, medium and equipment |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101034988A (en) * | 2007-02-15 | 2007-09-12 | 张仁平 | Network login authentication protection device and its using method |
CN102546914A (en) * | 2010-12-27 | 2012-07-04 | 梁志龙 | Automatic login system based on smart phone and control method |
CN103747013A (en) * | 2014-01-24 | 2014-04-23 | 沈文策 | Cloud terminal login verification method and device |
CN104751032A (en) * | 2013-12-31 | 2015-07-01 | 腾讯科技(深圳)有限公司 | Authentication method and authentication device |
CN105262774A (en) * | 2015-11-11 | 2016-01-20 | 浪潮(北京)电子信息产业有限公司 | Remote login method |
-
2017
- 2017-02-13 CN CN201710075885.5A patent/CN106790267A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101034988A (en) * | 2007-02-15 | 2007-09-12 | 张仁平 | Network login authentication protection device and its using method |
CN102546914A (en) * | 2010-12-27 | 2012-07-04 | 梁志龙 | Automatic login system based on smart phone and control method |
CN104751032A (en) * | 2013-12-31 | 2015-07-01 | 腾讯科技(深圳)有限公司 | Authentication method and authentication device |
CN103747013A (en) * | 2014-01-24 | 2014-04-23 | 沈文策 | Cloud terminal login verification method and device |
CN105262774A (en) * | 2015-11-11 | 2016-01-20 | 浪潮(北京)电子信息产业有限公司 | Remote login method |
Cited By (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107147661A (en) * | 2017-06-01 | 2017-09-08 | 郑州云海信息技术有限公司 | One kind strengthens File Transfer Protocol security system and method based on dynamic password |
CN107257302A (en) * | 2017-08-18 | 2017-10-17 | 郑州云海信息技术有限公司 | It is a kind of to strengthen the method and system of snmp protocol safety |
CN107347080A (en) * | 2017-09-05 | 2017-11-14 | 郑州云海信息技术有限公司 | A kind of method based on dynamic password enhancing serial port protocol safety |
CN107370765A (en) * | 2017-09-06 | 2017-11-21 | 郑州云海信息技术有限公司 | A kind of ftp server identity identifying method and system |
CN107371162A (en) * | 2017-09-12 | 2017-11-21 | 郑州云海信息技术有限公司 | A kind of method and system based on dynamic password enhancing wap protocol safety |
CN107566396A (en) * | 2017-09-28 | 2018-01-09 | 郑州云海信息技术有限公司 | A kind of method based on dynamic password enhancing server VPN protocol securitys |
TWI688245B (en) * | 2018-03-30 | 2020-03-11 | 香港商阿里巴巴集團服務有限公司 | Login method and device of internet of things equipment |
CN108566391B (en) * | 2018-03-30 | 2020-05-12 | 阿里巴巴集团控股有限公司 | Login method and device for Internet of things equipment |
WO2019184599A1 (en) * | 2018-03-30 | 2019-10-03 | 阿里巴巴集团控股有限公司 | Login method and apparatus for internet-of-things device |
CN108566391A (en) * | 2018-03-30 | 2018-09-21 | 阿里巴巴集团控股有限公司 | A kind of login method and device of internet of things equipment |
CN109617230A (en) * | 2018-12-06 | 2019-04-12 | 贵州电网有限责任公司 | The implementation method of exchange system secure configuration management in a kind of electrical power services device |
CN110401674A (en) * | 2019-08-19 | 2019-11-01 | 泰康保险集团股份有限公司 | Data access method, device, system, electronic equipment and computer-readable medium |
CN111083124B (en) * | 2019-12-02 | 2022-03-01 | 中国联合网络通信集团有限公司 | Cloud fortress login method and device |
CN111083124A (en) * | 2019-12-02 | 2020-04-28 | 中国联合网络通信集团有限公司 | Cloud fortress login method and device |
CN111181941A (en) * | 2019-12-23 | 2020-05-19 | 杭州安恒信息技术股份有限公司 | Page login method, system and related device |
CN111181941B (en) * | 2019-12-23 | 2022-07-05 | 杭州安恒信息技术股份有限公司 | Page login method, system and related device |
EP4002806A1 (en) * | 2020-11-17 | 2022-05-25 | Shenzhen Sekorm Component Network Co., Ltd | Business official email box based b2b service security verification method, apparatus, and server |
CN112615828A (en) * | 2020-12-08 | 2021-04-06 | 浙江启博知识产权运营有限公司 | Intellectual property operating system based on cloud computing network and intelligent authorization method |
CN113827983A (en) * | 2021-09-24 | 2021-12-24 | 深圳市白日梦网络科技有限公司 | Method and device for interaction between operating system and game application |
CN115134766A (en) * | 2022-05-18 | 2022-09-30 | 北京华融兴霁电子科技开发有限公司 | Short message-based machine room safety management method, system, medium and equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106790267A (en) | A kind of method and apparatus of access server operating system | |
CN105246073B (en) | The access authentication method and server of wireless network | |
CN108416589A (en) | Connection method, system and the computer readable storage medium of block chain node | |
CN104601324B (en) | A kind of verification method, terminal and system for application | |
CN106850635A (en) | A kind of method and apparatus for accessing single-set operation system | |
CN109784031B (en) | Account identity verification processing method and device | |
AU2013312578A1 (en) | Data security management system | |
CN104980926B (en) | The long-range control method and device of mobile terminal | |
CN102571808B (en) | Self-service tax terminal external network deployment method | |
CN103973715B (en) | Cloud computing security system and method | |
CN109040070A (en) | Document sending method, equipment and computer readable storage medium | |
CN101051905A (en) | Agent identity certificiation method | |
CN107846406A (en) | A kind of account logon method and device | |
CN105703910A (en) | Dynamic password verifying method based on Wechat service number | |
CN102833247A (en) | Method for anti-sweeping ciphers in user login system and device thereof | |
CN105975867A (en) | Data processing method | |
CN104468486B (en) | Information processing method, system and electronic equipment | |
CN106161710A (en) | A kind of user account safety management system based on smart mobile phone | |
CN106656992A (en) | Information verification method | |
CN109981677A (en) | A kind of credit management method and device | |
CN102413146A (en) | Client authorized logon method based on dynamic codes | |
CN101854357B (en) | Method and system for monitoring network authentication | |
CN103559430B (en) | application account management method and device based on Android system | |
CN110351296B (en) | Application login method and device and related equipment thereof | |
CN103177203A (en) | Computer login management system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170531 |
|
RJ01 | Rejection of invention patent application after publication |