CN107360129A - A kind of method that anti-authentication KEY loses - Google Patents

A kind of method that anti-authentication KEY loses Download PDF

Info

Publication number
CN107360129A
CN107360129A CN201710346081.4A CN201710346081A CN107360129A CN 107360129 A CN107360129 A CN 107360129A CN 201710346081 A CN201710346081 A CN 201710346081A CN 107360129 A CN107360129 A CN 107360129A
Authority
CN
China
Prior art keywords
key
state
loss
lost
management
Prior art date
Application number
CN201710346081.4A
Other languages
Chinese (zh)
Other versions
CN107360129B (en
Inventor
陈亮
毕永东
顾德仲
王海波
Original Assignee
北京北信源软件股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 北京北信源软件股份有限公司 filed Critical 北京北信源软件股份有限公司
Priority to CN201710346081.4A priority Critical patent/CN107360129B/en
Publication of CN107360129A publication Critical patent/CN107360129A/en
Application granted granted Critical
Publication of CN107360129B publication Critical patent/CN107360129B/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements or protocols for real-time communications
    • H04L65/10Signalling, control or architecture
    • H04L65/1066Session control
    • H04L65/1073Registration
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance or administration or management of packet switching networks
    • H04L41/04Architectural aspects of network management arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/0815Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network providing single-sign-on or federations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/0876Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint

Abstract

The invention belongs to field of information security technology, and in particular to a kind of method that anti-authentication KEY loses, comprise the following steps:First, newly-built one table for depositing KEY log-on messages in the database of system administration end;Meanwhile one management window of design;Then by the KEY in need used in the management end registered, while to KEY lose the setting of identification-state, and the KEY of new registration loss mark is initialized as non-lost condition, can normally log in use;Then when KEY is logged in, matched first with having registered KEY loss identification-state in database, judge whether the KEY is lost condition, if lost condition, then forbid logging in;Finally, for the KEY for showing lost condition, administrative staff are managed setting to the loss identification-state of the KEY in the table in the database.This method can carry out limitation login to specified KEY, non-management employee be prevented with KEY login systems, so as to substantially reduce the potential safety hazard of system.

Description

A kind of method that anti-authentication KEY loses

Technical field

The invention belongs to field of information security technology, and in particular to a kind of method that anti-authentication KEY loses.

Background technology

The not strict accurately anti-lost measures of the authentication KEY of current three-in-one login system, if KEY loses Lose, then once other nonsystematics administrative staff find, it is possible to it are used directly to log in three-in-one system so that the information of system Huge potential safety hazard be present.

The content of the invention

The present invention is in view of the shortcomings of the prior art, it is proposed that a kind of method that anti-authentication KEY loses, this method are realized Management to registered KEY, it is easy to administrative staff to understand and manages current all registered KEY details, and can be to referring to Fixed KEY carries out limitation login, prevents non-management employee with the KEY login systems obtained by other channels, so as to drop significantly The potential safety hazard of low system.

In order to solve the above technical problems, the technical scheme that the present invention takes is:

The present invention proposes a kind of method that anti-authentication KEY loses, it is characterised in that comprises the following steps:

(1)The table of newly-built storage KEY log-on messages in the database of system administration end;

(2)In the management window of system administration end interface one, for check all registered KEY whole log-on messages with And KEY loss identification-state is set;

(3)By the KEY in need used in the management end registered, while the KEY of new registration is carried out to lose mark shape The setting of state, when KEY is registered in the management end, KEY log-on message is stored in described newly-built by system automatically In table, and the KEY of new registration loss mark is initialized as non-lost condition, can normally log in use;

(4)When KEY is logged in, matched first with having registered KEY loss identification-state in database, judge the KEY Whether it is lost condition, if lost condition, then forbids logging in;

(5)KEY for showing lost condition, administrative staff identify shape to the loss of the KEY in the table in the database State is managed setting.

Further, in the step 5, loss identification-state of the administrative staff to the KEY in the table in the database The method for being managed setting is:If some KEY has lost or do not used, use can be normally logged in using one KEY log in management end, open KEY management modules, specified KEY loss identification-state is arranged to lose, then the KEY It can not be just continuing with management end;, whereas if the KEY lost has found or can be continuing with, then managed in KEY After the lost condition of the KEY is remodified not lose in module, the KEY can be continuing with.

Further, the log-on message of the KEY includes:Identity information, sequence number and the loss mark of registrant.

Further, the loss mark of the KEY includes coding and type, wherein, lose identification-state and be shown as 1, Type is shown as having lost;Identification-state is not lost and is shown as 0, and type is shown as not losing.

The present invention comprises at least following beneficial effect:The present invention one identity to being registered on current management systems of increase Certification KEY management module, the management to registered KEY is realized, be easy to administrative staff to understand and manage currently all noted Volume KEY details, all information in current management end registration KEY can be checked(Including sequence number, registrant, whether lose Lose etc.), while by setting KEY loss to identify, limitation login is carried out to specified KEY, prevents non-management employee with passing through The KEY login systems that other channels obtain, so as to substantially reduce the potential safety hazard of system.

Brief description of the drawings

Fig. 1 is the flow chart of the inventive method.

Embodiment

In order that those skilled in the art more fully understand technical scheme, with reference to specific embodiment to this Invention is described in further detail.The embodiments described below is exemplary, is only used for explaining the present invention, without being understood that For limitation of the present invention.

The present invention proposes a kind of method that anti-authentication KEY loses, and comprises the following steps:The first step:In system pipes Manage the table of newly-built storage KEY log-on messages in the database at end;Second step:In one management of system administration end interface Window, while increase a management module in the system administration end, for checking and managing all registered KEY whole notes Volume information and the loss identification-state that KEY is set, according to some embodiments of the present invention, KEY of the present invention registration letter Breath includes:Identity information, sequence number and the loss mark of registrant, wherein the identity information of the registrant can include biology Information and finger print information, the loss mark of the KEY include coding and type, wherein, lose identification-state and be shown as 1, class Type is shown as having lost;Identification-state is not lost and is shown as 0, and type is shown as not losing.

According to an embodiment of the invention, Fig. 1 is the flow chart of the inventive method, shown in reference picture 1, the 3rd step:Will be all Need the KEY used in the management end to be registered, while to the KEY of new registration lose the setting of identification-state, work as KEY When the management end is registered, KEY log-on message is stored in table newly-built in the database by system automatically, and The KEY of new registration loss mark is initialized as non-lost condition, can normally log in use.

According to an embodiment of the invention, shown in reference picture 1, the 4th step:When there is KEY logins, first with database Loss identification-state through registering KEY is matched, and judges whether the KEY is lost condition, if lost condition, then prohibit Only log in.

According to an embodiment of the invention, shown in reference picture 1, the 5th step:KEY for showing lost condition, custodian Member is managed setting to the loss identification-state of the KEY in the table in the database, is specifically:If some KEY is Lose or do not use, then the KEY used can be normally logged in using one and logs in management end, opens KEY management modules, will The KEY specified loss identification-state is arranged to lose, then the KEY can not be just continuing with management end;, whereas if The KEY of loss has found or can be continuing with, then in KEY management modules by the lost condition of the KEY remodify for After not losing, the KEY can be continuing with.

Inventor has found, according to the method for anti-authentication KEY loss of the present invention, by increasing by one to current The authentication KEY registered in management system management module, realizes the management to registered KEY, is easy to administrative staff Solve and manage current all registered KEY details, all information in current management end registration KEY can be checked(Including Sequence number, registrant, whether lose), while by setting KEY loss to identify, limitation login is carried out to specified KEY, Non-management employee is prevented with the KEY login systems obtained by other channels, so as to substantially reduce the potential safety hazard of system.

Although embodiments of the invention have been shown and described above, it is to be understood that above-described embodiment is example Property, it is impossible to limitation of the present invention is interpreted as, one of ordinary skill in the art within the scope of the invention can be to above-mentioned Embodiment is changed, changed, replacing and modification, meanwhile, for those of ordinary skill in the art, the think of according to the application Think, in specific embodiments and applications there will be changes.

Claims (4)

1. a kind of method that anti-authentication KEY loses, it is characterised in that comprise the following steps:
(1)The table of newly-built storage KEY log-on messages in the database of system administration end;
(2)In the management window of system administration end interface one, for check all registered KEY whole log-on messages with And KEY loss identification-state is set;
(3)By the KEY in need used in the management end registered, while the KEY of new registration is carried out to lose mark shape The setting of state, when KEY is registered in the management end, KEY log-on message is stored in described newly-built by system automatically In table, and the KEY of new registration loss mark is initialized as non-lost condition, can normally log in use;
(4)When KEY is logged in, matched first with having registered KEY loss identification-state in database, judge the KEY Whether it is lost condition, if lost condition, then forbids logging in;
(5)KEY for showing lost condition, administrative staff identify shape to the loss of the KEY in the table in the database State is managed setting.
2. according to the method for claim 1, it is characterised in that in the step 5, administrative staff are in the database The method that the loss identification-state of KEY in table is managed setting is:If some KEY has lost or not used, The KEY used can be normally logged in using one and logs in management end, KEY management modules is opened, specified KEY loss is identified State is arranged to lose, then the KEY can not be just continuing with management end;, whereas if lose KEY found or It can be continuing with, then after the lost condition of the KEY is remodified not lose in KEY management modules, can be continuing with The KEY.
3. according to the method for claim 1, it is characterised in that the log-on message of the KEY includes:The identity letter of registrant Breath, sequence number and loss mark.
4. the method according to claim 1 or 3, it is characterised in that the loss mark of the KEY includes coding and type, Wherein, identification-state has been lost and has been shown as 1, type is shown as having lost;Identification-state is not lost and is shown as 0, and type is shown as Do not lose.
CN201710346081.4A 2017-05-17 2017-05-17 A kind of method that anti-authentication KEY loses CN107360129B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710346081.4A CN107360129B (en) 2017-05-17 2017-05-17 A kind of method that anti-authentication KEY loses

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710346081.4A CN107360129B (en) 2017-05-17 2017-05-17 A kind of method that anti-authentication KEY loses

Publications (2)

Publication Number Publication Date
CN107360129A true CN107360129A (en) 2017-11-17
CN107360129B CN107360129B (en) 2019-10-01

Family

ID=60271776

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710346081.4A CN107360129B (en) 2017-05-17 2017-05-17 A kind of method that anti-authentication KEY loses

Country Status (1)

Country Link
CN (1) CN107360129B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8219803B2 (en) * 2008-10-20 2012-07-10 Disney Enterprises, Inc. System and method for unlocking content associated with media
CN102932149A (en) * 2012-10-30 2013-02-13 武汉理工大学 Integrated identity based encryption (IBE) data encryption system
CN104951409A (en) * 2015-06-12 2015-09-30 中国科学院信息工程研究所 System and method for full disk encryption based on hardware
CN105279910A (en) * 2015-11-24 2016-01-27 昆山玖趣智能科技有限公司 Intelligent anti-lost integrating fingerprint identification and password management functions

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8219803B2 (en) * 2008-10-20 2012-07-10 Disney Enterprises, Inc. System and method for unlocking content associated with media
CN102932149A (en) * 2012-10-30 2013-02-13 武汉理工大学 Integrated identity based encryption (IBE) data encryption system
CN104951409A (en) * 2015-06-12 2015-09-30 中国科学院信息工程研究所 System and method for full disk encryption based on hardware
CN105279910A (en) * 2015-11-24 2016-01-27 昆山玖趣智能科技有限公司 Intelligent anti-lost integrating fingerprint identification and password management functions

Also Published As

Publication number Publication date
CN107360129B (en) 2019-10-01

Similar Documents

Publication Publication Date Title
CN105488431B (en) Block chain system authority management method and device
JP6396623B2 (en) System and method for monitoring, controlling, and encrypting per-document information on corporate information stored on a cloud computing service (CCS)
US9858626B2 (en) Social sharing of security information in a group
US20170286653A1 (en) Identity risk score generation and implementation
US20160037348A1 (en) Associating services to perimeters
JP2014528195A (en) Device-to-device security authentication apparatus and method based on PUF in thing intelligent communication
US8327421B2 (en) System and method for identity consolidation
CN101800646B (en) Implementation method and system of electronic signature
US7434252B2 (en) Role-based authorization of network services using diversified security tokens
CN104104654B (en) A kind of setting Wifi access rights, the method and apparatus of Wifi certifications
KR101327317B1 (en) Apparatus and method for sap application traffic analysis and monitoring, and the information protection system thereof
US10275723B2 (en) Policy enforcement via attestations
RU2367998C2 (en) Method and system for recognition of registration information
CN103632404B (en) A kind of multiple enterprises Work attendance method based on the realization of converged communication technology and system
CN103514410A (en) Dependable preservation and evidence collection system and method for electronic contract
US8490163B1 (en) Enforcing security policies across heterogeneous systems
CN103295304B (en) Based on community intelligent entrance guard control method and the device thereof of mobile phone 3G network
TW548592B (en) System and method for single login of application program
US20070294743A1 (en) Selecting policy for compatible communication
US8726358B2 (en) Identity ownership migration
Da'na et al. Development of a monitoring and control platform for PLC-based applications
US9032038B2 (en) Recipient control system for ensuring non-conflicting and comprehensive distribution of digital information and method thereof
WO2008042913A2 (en) Systems and methods for delegating information technology authorization to at least one other person
CN1601954B (en) Moving principals across security boundaries without service interruption
US20040122961A1 (en) Method and architecture to provide client session failover

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant