CN107360129B - A kind of method that anti-authentication KEY loses - Google Patents
A kind of method that anti-authentication KEY loses Download PDFInfo
- Publication number
- CN107360129B CN107360129B CN201710346081.4A CN201710346081A CN107360129B CN 107360129 B CN107360129 B CN 107360129B CN 201710346081 A CN201710346081 A CN 201710346081A CN 107360129 B CN107360129 B CN 107360129B
- Authority
- CN
- China
- Prior art keywords
- key
- lost
- state
- loss
- identification
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements, protocols or services for supporting real-time applications in data packet communication
- H04L65/1066—Session management
- H04L65/1073—Registration or de-registration
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/04—Network management architectures or arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0815—Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- General Business, Economics & Management (AREA)
- Multimedia (AREA)
- Power Engineering (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention belongs to field of information security technology, and in particular to a kind of method that anti-authentication KEY loses, comprising the following steps: firstly, creating the table of a storage KEY registration information in the database of system administration end;Meanwhile designing a management window;Then by the KEY in need used in the management end register, while to KEY carry out lose identification-state setting, and by the loss of the KEY of new registration mark be initialized as non-lost condition, can normally log in use;Then it when KEY is logged in, is matched first with the loss identification-state for having registered KEY in database, judges whether the KEY is lost condition, if it is lost condition, then forbid logging in;Finally, for the KEY for showing lost condition, administrative staff are managed setting to the loss identification-state of the KEY in the table in the database.This method can carry out limitation login to specified KEY, non-management employee's KEY login system be prevented, to substantially reduce the security risk of system.
Description
Technical field
The invention belongs to field of information security technology, and in particular to a kind of method that anti-authentication KEY loses.
Background technique
There is no stringent accurately anti-lost measures by the authentication KEY of current three-in-one login system, if KEY loses
It loses, once then other nonsystematics administrative staff find, so that it may it is used directly to log in three-in-one system, so that the information of system
There are huge security risks.
Summary of the invention
In view of the deficiencies of the prior art, the present invention proposes a kind of method that anti-authentication KEY loses, this method is realized
Management to registered KEY understands convenient for administrative staff and manages the details of current all registered KEY, and can be to finger
Fixed KEY carries out limitation login, non-management employee's KEY login system obtained by other channels is prevented, to drop significantly
The security risk of low system.
In order to solve the above technical problems, the technical scheme adopted by the invention is as follows:
The invention proposes a kind of methods that anti-authentication KEY loses, which comprises the following steps:
(1) table of a storage KEY registration information is created in the database of system administration end;
(2) in one management window of system administration end interface, for checking whole registration letters of all registered KEY
The loss identification-state of breath and setting KEY;
(3) by the KEY in need used in the management end register, while loss mark is carried out to the KEY of new registration
The setting of knowledge state, when KEY is when the management end is registered, the registration information of KEY is stored in described new by system automatically
In the table built, and the loss of the KEY of new registration mark is initialized as non-lost condition, can normally log in use;
(4) it when KEY is logged in, is matched first with the loss identification-state for having registered KEY in database, judgement should
Whether KEY is lost condition, if it is lost condition, then forbids logging in;
(5) for showing the KEY of lost condition, loss mark of the administrative staff to the KEY in the table in the database
Knowledge state is managed setting.
Further, in the step 5, loss identification-state of the administrative staff to the KEY in the table in the database
The method for being managed setting are as follows: if some KEY has lost or do not used, can normally log in use using one
KEY log in management end, open KEY management module, the loss identification-state of specified KEY is set as having lost, then the KEY
It can not just be continued to use in management end;, whereas if the KEY lost has found or can continue to use, then managed in KEY
After remodifying the lost condition of the KEY not lose in module, the KEY can be continued to use.
Further, the registration information of the KEY includes: the identity information, sequence number and loss mark of registrant.
Further, the loss mark of the KEY includes coding and type, wherein and it has lost identification-state and has been shown as 1,
Type is shown as having lost;Identification-state is not lost and is shown as 0, and type is shown as not losing.
The present invention is include at least the following beneficial effects: the present invention increases by one to the identity registered on current management systems
The management module for authenticating KEY, realizes the management to registered KEY, understands convenient for administrative staff and manages currently all infused
The details of volume KEY, can check whether all information in current management end registration KEY (including sequence number, registrant, lose
Lose etc.), while by the loss mark of setting KEY, limitation login is carried out to specified KEY, prevents non-management employee with passing through
The KEY login system that other channels obtain, to substantially reduce the security risk of system.
Detailed description of the invention
Fig. 1 is the flow chart of the method for the present invention.
Specific embodiment
In order to make those skilled in the art more fully understand technical solution of the present invention, combined with specific embodiments below to this
Invention is described in further detail.The embodiments described below is exemplary, and for explaining only the invention, and cannot be understood
For limitation of the present invention.
The invention proposes a kind of methods that anti-authentication KEY loses, comprising the following steps: step 1: in system pipes
Manage the table that a storage KEY registration information is created in the database at end;Step 2: being managed at system administration end interface one
Window, while increasing a management module in the system administration end, for checking and managing whole notes of all registered KEY
Volume information and the loss identification-state that KEY is arranged, according to some embodiments of the present invention, the registration of KEY of the present invention are believed
Breath includes: the identity information, sequence number and loss mark of registrant, wherein the identity information of the registrant may include biology
The loss mark of information and finger print information, the KEY includes coding and type, wherein and it has lost identification-state and has been shown as 1, class
Type is shown as having lost;Identification-state is not lost and is shown as 0, and type is shown as not losing.
According to an embodiment of the invention, Fig. 1 is the flow chart of the method for the present invention, and it is shown referring to Fig.1, step 3: will own
It needs the KEY used in the management end to be registered, while lose to the KEY of new registration the setting of identification-state, work as KEY
When the management end is registered, the registration information of KEY is stored in the table created in the database by system automatically, and
The loss mark of the KEY of new registration is initialized as non-lost condition, can normally log in use.
According to an embodiment of the invention, shown in referring to Fig.1, step 4: when there is KEY login, first in database
Loss identification-state through registering KEY is matched, and judges whether the KEY is lost condition, if it is lost condition, is then prohibited
Only log in.
According to an embodiment of the invention, shown in referring to Fig.1, step 5: the KEY for showing lost condition, administrator
Member is managed setting to the loss identification-state of the KEY in the table in the database, specifically are as follows: if some KEY is
It loses or does not use, then can normally log in the KEY used using one and log in management end, open KEY management module, it will
The loss identification-state of specified KEY is set as having lost, then the KEY can not just be continued to use in management end;, whereas if
The KEY of loss has found or can continue to use, then in KEY management module by the lost condition of the KEY remodify for
After not losing, the KEY can be continued to use.
Inventors have found that the method that the anti-authentication KEY loses according to the present invention, by increasing by one to current
The management module of the authentication KEY registered in management system realizes the management to registered KEY, is convenient for administrative staff
The details for solving and managing current all registered KEY, can check it is all in current management end registration KEY information (including
Whether sequence number registrant, is lost), while by the loss mark of setting KEY, limitation login is carried out to specified KEY,
Non-management employee's KEY login system obtained by other channels is prevented, to substantially reduce the security risk of system.
Although the embodiments of the present invention has been shown and described above, it is to be understood that above-described embodiment is example
Property, it is not considered as limiting the invention, those skilled in the art within the scope of the invention can be to above-mentioned
Embodiment is changed, modifies, replacement and variant, at the same time, for those skilled in the art, the think of according to the application
Think, there will be changes in the specific implementation manner and application range.
Claims (3)
1. a kind of method that anti-authentication KEY loses, which comprises the following steps:
(1) table of a storage KEY registration information is created in the database of system administration end;
(2) in one management window of system administration end interface, for check whole registration informations of all registered KEY with
And the loss identification-state of setting KEY;
(3) by the KEY in need used in the management end register, while to the KEY of new registration carry out lose mark shape
The setting of state, when KEY is when the management end is registered, the registration information of KEY is stored in described newly-built by system automatically
In table, and the loss of the KEY of new registration mark is initialized as non-lost condition, can normally log in use;
(4) it when KEY is logged in, is matched first with the loss identification-state for having registered KEY in database, judges the KEY
Whether it is lost condition, if it is lost condition, then forbids logging in;
(5) for showing that the KEY of lost condition, administrative staff identify shape to the loss of the KEY in the table in the database
State is managed setting, specifically: if some KEY has lost or do not used, can normally be logged in using one is made
KEY logs in management end, opens KEY management module, the loss identification-state of specified KEY is set as having lost, then should
KEY can not just be continued to use in management end;, whereas if the KEY lost has found or can continue to use, then in KEY
After remodifying the lost condition of the KEY not lose in management module, the KEY can be continued to use.
2. the method according to claim 1, wherein the registration information of the KEY includes: the identity letter of registrant
Breath, sequence number and loss mark.
3. method according to claim 1 or 2, which is characterized in that the loss mark of the KEY includes coding and type,
Wherein, it has lost identification-state and has been shown as 1, type is shown as having lost;Identification-state is not lost and is shown as 0, and type is shown as
It does not lose.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710346081.4A CN107360129B (en) | 2017-05-17 | 2017-05-17 | A kind of method that anti-authentication KEY loses |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710346081.4A CN107360129B (en) | 2017-05-17 | 2017-05-17 | A kind of method that anti-authentication KEY loses |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107360129A CN107360129A (en) | 2017-11-17 |
CN107360129B true CN107360129B (en) | 2019-10-01 |
Family
ID=60271776
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710346081.4A Active CN107360129B (en) | 2017-05-17 | 2017-05-17 | A kind of method that anti-authentication KEY loses |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107360129B (en) |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8219803B2 (en) * | 2008-10-20 | 2012-07-10 | Disney Enterprises, Inc. | System and method for unlocking content associated with media |
CN102932149B (en) * | 2012-10-30 | 2015-04-01 | 武汉理工大学 | Integrated identity based encryption (IBE) data encryption system |
CN104951409B (en) * | 2015-06-12 | 2019-03-08 | 中国科学院信息工程研究所 | A kind of hardware based full disk encryption system and encryption method |
CN105279910A (en) * | 2015-11-24 | 2016-01-27 | 昆山玖趣智能科技有限公司 | Intelligent anti-lost integrating fingerprint identification and password management functions |
-
2017
- 2017-05-17 CN CN201710346081.4A patent/CN107360129B/en active Active
Also Published As
Publication number | Publication date |
---|---|
CN107360129A (en) | 2017-11-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110957025A (en) | Medical health information safety management system | |
CN113360862A (en) | Unified identity authentication system, method, electronic device and storage medium | |
CN202003425U (en) | Central management system for monitoring intelligent lock | |
CN106293816B (en) | A method of increasing the viscosity of the App of user and mobile intelligent terminal installation | |
CN103150777A (en) | Mobile attendance method and system | |
CN104134261A (en) | Smartphone-based intelligent lock management system | |
WO2019086416A1 (en) | System and method for controlling the access of persons | |
CN107025411B (en) | A kind of system and method for fine-grained data permission dynamic control | |
Giura et al. | Is it really you? User identification via adaptive behavior fingerprinting | |
CN107360129B (en) | A kind of method that anti-authentication KEY loses | |
CN107886601A (en) | A kind of office door access control system and its open method | |
CN105610855A (en) | Method and device for login verification of cross-domain system | |
CN103607508B (en) | The management method of a kind of authority, device and mobile phone terminal | |
CN110503563B (en) | Risk control method and system | |
CN106293361A (en) | A kind of information replying method and device | |
CN103780582A (en) | Mobile phone certificate-based cloud end data access method | |
CN108428259A (en) | A kind of Work attendance method and its equipment | |
CN112446990A (en) | Intelligent lock system | |
CN113010865A (en) | Big data basic component safety management method and system of intelligent education platform | |
CN108053507A (en) | A kind of management method of checking card based on cloud lock, system | |
CN105205773A (en) | Community correction intelligent facial recognition management system | |
CN104640115B (en) | The temporary authentication method of cloud lock | |
CN108241803A (en) | A kind of access control method of heterogeneous system | |
CN109299605A (en) | A kind of application method and system of seal protector | |
CN115408673B (en) | Software validity period access control management system and method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |