CN107360129B - A kind of method that anti-authentication KEY loses - Google Patents

A kind of method that anti-authentication KEY loses Download PDF

Info

Publication number
CN107360129B
CN107360129B CN201710346081.4A CN201710346081A CN107360129B CN 107360129 B CN107360129 B CN 107360129B CN 201710346081 A CN201710346081 A CN 201710346081A CN 107360129 B CN107360129 B CN 107360129B
Authority
CN
China
Prior art keywords
key
lost
state
loss
identification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710346081.4A
Other languages
Chinese (zh)
Other versions
CN107360129A (en
Inventor
陈亮
毕永东
顾德仲
王海波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing VRV Software Corp Ltd
Original Assignee
Beijing VRV Software Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing VRV Software Corp Ltd filed Critical Beijing VRV Software Corp Ltd
Priority to CN201710346081.4A priority Critical patent/CN107360129B/en
Publication of CN107360129A publication Critical patent/CN107360129A/en
Application granted granted Critical
Publication of CN107360129B publication Critical patent/CN107360129B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/1066Session management
    • H04L65/1073Registration or de-registration
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/04Network management architectures or arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • General Business, Economics & Management (AREA)
  • Multimedia (AREA)
  • Power Engineering (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention belongs to field of information security technology, and in particular to a kind of method that anti-authentication KEY loses, comprising the following steps: firstly, creating the table of a storage KEY registration information in the database of system administration end;Meanwhile designing a management window;Then by the KEY in need used in the management end register, while to KEY carry out lose identification-state setting, and by the loss of the KEY of new registration mark be initialized as non-lost condition, can normally log in use;Then it when KEY is logged in, is matched first with the loss identification-state for having registered KEY in database, judges whether the KEY is lost condition, if it is lost condition, then forbid logging in;Finally, for the KEY for showing lost condition, administrative staff are managed setting to the loss identification-state of the KEY in the table in the database.This method can carry out limitation login to specified KEY, non-management employee's KEY login system be prevented, to substantially reduce the security risk of system.

Description

A kind of method that anti-authentication KEY loses
Technical field
The invention belongs to field of information security technology, and in particular to a kind of method that anti-authentication KEY loses.
Background technique
There is no stringent accurately anti-lost measures by the authentication KEY of current three-in-one login system, if KEY loses It loses, once then other nonsystematics administrative staff find, so that it may it is used directly to log in three-in-one system, so that the information of system There are huge security risks.
Summary of the invention
In view of the deficiencies of the prior art, the present invention proposes a kind of method that anti-authentication KEY loses, this method is realized Management to registered KEY understands convenient for administrative staff and manages the details of current all registered KEY, and can be to finger Fixed KEY carries out limitation login, non-management employee's KEY login system obtained by other channels is prevented, to drop significantly The security risk of low system.
In order to solve the above technical problems, the technical scheme adopted by the invention is as follows:
The invention proposes a kind of methods that anti-authentication KEY loses, which comprises the following steps:
(1) table of a storage KEY registration information is created in the database of system administration end;
(2) in one management window of system administration end interface, for checking whole registration letters of all registered KEY The loss identification-state of breath and setting KEY;
(3) by the KEY in need used in the management end register, while loss mark is carried out to the KEY of new registration The setting of knowledge state, when KEY is when the management end is registered, the registration information of KEY is stored in described new by system automatically In the table built, and the loss of the KEY of new registration mark is initialized as non-lost condition, can normally log in use;
(4) it when KEY is logged in, is matched first with the loss identification-state for having registered KEY in database, judgement should Whether KEY is lost condition, if it is lost condition, then forbids logging in;
(5) for showing the KEY of lost condition, loss mark of the administrative staff to the KEY in the table in the database Knowledge state is managed setting.
Further, in the step 5, loss identification-state of the administrative staff to the KEY in the table in the database The method for being managed setting are as follows: if some KEY has lost or do not used, can normally log in use using one KEY log in management end, open KEY management module, the loss identification-state of specified KEY is set as having lost, then the KEY It can not just be continued to use in management end;, whereas if the KEY lost has found or can continue to use, then managed in KEY After remodifying the lost condition of the KEY not lose in module, the KEY can be continued to use.
Further, the registration information of the KEY includes: the identity information, sequence number and loss mark of registrant.
Further, the loss mark of the KEY includes coding and type, wherein and it has lost identification-state and has been shown as 1, Type is shown as having lost;Identification-state is not lost and is shown as 0, and type is shown as not losing.
The present invention is include at least the following beneficial effects: the present invention increases by one to the identity registered on current management systems The management module for authenticating KEY, realizes the management to registered KEY, understands convenient for administrative staff and manages currently all infused The details of volume KEY, can check whether all information in current management end registration KEY (including sequence number, registrant, lose Lose etc.), while by the loss mark of setting KEY, limitation login is carried out to specified KEY, prevents non-management employee with passing through The KEY login system that other channels obtain, to substantially reduce the security risk of system.
Detailed description of the invention
Fig. 1 is the flow chart of the method for the present invention.
Specific embodiment
In order to make those skilled in the art more fully understand technical solution of the present invention, combined with specific embodiments below to this Invention is described in further detail.The embodiments described below is exemplary, and for explaining only the invention, and cannot be understood For limitation of the present invention.
The invention proposes a kind of methods that anti-authentication KEY loses, comprising the following steps: step 1: in system pipes Manage the table that a storage KEY registration information is created in the database at end;Step 2: being managed at system administration end interface one Window, while increasing a management module in the system administration end, for checking and managing whole notes of all registered KEY Volume information and the loss identification-state that KEY is arranged, according to some embodiments of the present invention, the registration of KEY of the present invention are believed Breath includes: the identity information, sequence number and loss mark of registrant, wherein the identity information of the registrant may include biology The loss mark of information and finger print information, the KEY includes coding and type, wherein and it has lost identification-state and has been shown as 1, class Type is shown as having lost;Identification-state is not lost and is shown as 0, and type is shown as not losing.
According to an embodiment of the invention, Fig. 1 is the flow chart of the method for the present invention, and it is shown referring to Fig.1, step 3: will own It needs the KEY used in the management end to be registered, while lose to the KEY of new registration the setting of identification-state, work as KEY When the management end is registered, the registration information of KEY is stored in the table created in the database by system automatically, and The loss mark of the KEY of new registration is initialized as non-lost condition, can normally log in use.
According to an embodiment of the invention, shown in referring to Fig.1, step 4: when there is KEY login, first in database Loss identification-state through registering KEY is matched, and judges whether the KEY is lost condition, if it is lost condition, is then prohibited Only log in.
According to an embodiment of the invention, shown in referring to Fig.1, step 5: the KEY for showing lost condition, administrator Member is managed setting to the loss identification-state of the KEY in the table in the database, specifically are as follows: if some KEY is It loses or does not use, then can normally log in the KEY used using one and log in management end, open KEY management module, it will The loss identification-state of specified KEY is set as having lost, then the KEY can not just be continued to use in management end;, whereas if The KEY of loss has found or can continue to use, then in KEY management module by the lost condition of the KEY remodify for After not losing, the KEY can be continued to use.
Inventors have found that the method that the anti-authentication KEY loses according to the present invention, by increasing by one to current The management module of the authentication KEY registered in management system realizes the management to registered KEY, is convenient for administrative staff The details for solving and managing current all registered KEY, can check it is all in current management end registration KEY information (including Whether sequence number registrant, is lost), while by the loss mark of setting KEY, limitation login is carried out to specified KEY, Non-management employee's KEY login system obtained by other channels is prevented, to substantially reduce the security risk of system.
Although the embodiments of the present invention has been shown and described above, it is to be understood that above-described embodiment is example Property, it is not considered as limiting the invention, those skilled in the art within the scope of the invention can be to above-mentioned Embodiment is changed, modifies, replacement and variant, at the same time, for those skilled in the art, the think of according to the application Think, there will be changes in the specific implementation manner and application range.

Claims (3)

1. a kind of method that anti-authentication KEY loses, which comprises the following steps:
(1) table of a storage KEY registration information is created in the database of system administration end;
(2) in one management window of system administration end interface, for check whole registration informations of all registered KEY with And the loss identification-state of setting KEY;
(3) by the KEY in need used in the management end register, while to the KEY of new registration carry out lose mark shape The setting of state, when KEY is when the management end is registered, the registration information of KEY is stored in described newly-built by system automatically In table, and the loss of the KEY of new registration mark is initialized as non-lost condition, can normally log in use;
(4) it when KEY is logged in, is matched first with the loss identification-state for having registered KEY in database, judges the KEY Whether it is lost condition, if it is lost condition, then forbids logging in;
(5) for showing that the KEY of lost condition, administrative staff identify shape to the loss of the KEY in the table in the database State is managed setting, specifically: if some KEY has lost or do not used, can normally be logged in using one is made KEY logs in management end, opens KEY management module, the loss identification-state of specified KEY is set as having lost, then should KEY can not just be continued to use in management end;, whereas if the KEY lost has found or can continue to use, then in KEY After remodifying the lost condition of the KEY not lose in management module, the KEY can be continued to use.
2. the method according to claim 1, wherein the registration information of the KEY includes: the identity letter of registrant Breath, sequence number and loss mark.
3. method according to claim 1 or 2, which is characterized in that the loss mark of the KEY includes coding and type, Wherein, it has lost identification-state and has been shown as 1, type is shown as having lost;Identification-state is not lost and is shown as 0, and type is shown as It does not lose.
CN201710346081.4A 2017-05-17 2017-05-17 A kind of method that anti-authentication KEY loses Active CN107360129B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710346081.4A CN107360129B (en) 2017-05-17 2017-05-17 A kind of method that anti-authentication KEY loses

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710346081.4A CN107360129B (en) 2017-05-17 2017-05-17 A kind of method that anti-authentication KEY loses

Publications (2)

Publication Number Publication Date
CN107360129A CN107360129A (en) 2017-11-17
CN107360129B true CN107360129B (en) 2019-10-01

Family

ID=60271776

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710346081.4A Active CN107360129B (en) 2017-05-17 2017-05-17 A kind of method that anti-authentication KEY loses

Country Status (1)

Country Link
CN (1) CN107360129B (en)

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8219803B2 (en) * 2008-10-20 2012-07-10 Disney Enterprises, Inc. System and method for unlocking content associated with media
CN102932149B (en) * 2012-10-30 2015-04-01 武汉理工大学 Integrated identity based encryption (IBE) data encryption system
CN104951409B (en) * 2015-06-12 2019-03-08 中国科学院信息工程研究所 A kind of hardware based full disk encryption system and encryption method
CN105279910A (en) * 2015-11-24 2016-01-27 昆山玖趣智能科技有限公司 Intelligent anti-lost integrating fingerprint identification and password management functions

Also Published As

Publication number Publication date
CN107360129A (en) 2017-11-17

Similar Documents

Publication Publication Date Title
CN110957025A (en) Medical health information safety management system
CN113360862A (en) Unified identity authentication system, method, electronic device and storage medium
CN202003425U (en) Central management system for monitoring intelligent lock
CN106293816B (en) A method of increasing the viscosity of the App of user and mobile intelligent terminal installation
CN103150777A (en) Mobile attendance method and system
CN104134261A (en) Smartphone-based intelligent lock management system
WO2019086416A1 (en) System and method for controlling the access of persons
CN107025411B (en) A kind of system and method for fine-grained data permission dynamic control
Giura et al. Is it really you? User identification via adaptive behavior fingerprinting
CN107360129B (en) A kind of method that anti-authentication KEY loses
CN107886601A (en) A kind of office door access control system and its open method
CN105610855A (en) Method and device for login verification of cross-domain system
CN103607508B (en) The management method of a kind of authority, device and mobile phone terminal
CN110503563B (en) Risk control method and system
CN106293361A (en) A kind of information replying method and device
CN103780582A (en) Mobile phone certificate-based cloud end data access method
CN108428259A (en) A kind of Work attendance method and its equipment
CN112446990A (en) Intelligent lock system
CN113010865A (en) Big data basic component safety management method and system of intelligent education platform
CN108053507A (en) A kind of management method of checking card based on cloud lock, system
CN105205773A (en) Community correction intelligent facial recognition management system
CN104640115B (en) The temporary authentication method of cloud lock
CN108241803A (en) A kind of access control method of heterogeneous system
CN109299605A (en) A kind of application method and system of seal protector
CN115408673B (en) Software validity period access control management system and method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant