CN107871081A - A kind of computer information safe system - Google Patents

A kind of computer information safe system Download PDF

Info

Publication number
CN107871081A
CN107871081A CN201711236445.XA CN201711236445A CN107871081A CN 107871081 A CN107871081 A CN 107871081A CN 201711236445 A CN201711236445 A CN 201711236445A CN 107871081 A CN107871081 A CN 107871081A
Authority
CN
China
Prior art keywords
module
data
security
encryption
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711236445.XA
Other languages
Chinese (zh)
Inventor
周金良
梁健
邹玉堂
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Meizhou Lian An Science And Technology Co Ltd
Original Assignee
Meizhou Lian An Science And Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Meizhou Lian An Science And Technology Co Ltd filed Critical Meizhou Lian An Science And Technology Co Ltd
Priority to CN201711236445.XA priority Critical patent/CN107871081A/en
Publication of CN107871081A publication Critical patent/CN107871081A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computing Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of computer information safe system, including human-machine operation module, authentication module, risk evaluation module, security control selection and implement module, information system classification and grade classification module, safety program module, validation verification module, system authorization module and central processing unit, the multiple checkings of the present invention are integrated, substantially increase the security of computerized information, only the talent with modification authority can modify and watch to data, substantially increase the security of information data.

Description

A kind of computer information safe system
Technical field
The present invention relates to mainboard, specially a kind of computer information safe system.
Background technology
With the fast development of computer technology and network so that computer has become people in work, study and life Indispensable instrument in work, equally, the development of computer network, also bring the potential safety hazard of subscriber computer information, net Network information stealth, information attack, viral transmission etc. all exist and occurred all the time, and the information of calculator memory storage has difference Safe class, for example some in the absence of the file of confidentiality, some are related to the file of confidentiality, and existing computer is being set When putting login authentication, after tentatively Information Authentication is completed, all different grades of files can be observed, it is very uneasy Entirely, it is inconvenient for use.
So how to design a kind of computer information safe system, turning into us will currently solve the problems, such as.
The content of the invention
It is an object of the invention to provide a kind of computer information safe system, to solve what is proposed in above-mentioned background technology Problem.
To achieve the above object, the present invention provides following technical scheme:A kind of computer information safe system, including it is man-machine Operation module, for carrying out user's registration, and the biological characteristic model of the corresponding user's registration identity of generation is gathered, and by institute State after biological characteristic model is encrypted by encrypting module and be saved in user registry database;For carrying out needing to store data Input, and it is sent to central processing unit after the data inputted are encrypted by encrypting module;For inputting voice print database and people Face data, and these data are sent to central processing unit;For inputting formation access requests and data modification request and repairing Change operation;
Authentication module, for the biological characteristic model in the biological attribute data and user registry database that receive to be entered Row similarity comparison, and the encrypting module being sent to after comparing result is calculated by the algorithm of setting in central processing unit Decoded;
Risk evaluation module, to analyze fragility existing for the threat, information system that information system faces, information system may The security incident loss run into and thus caused risk;Meanwhile risk assessment will be that information system determines its demand for security;With Afterwards, should according to the information system determined in risk assessment in terms of confidentiality, integrity, and availability existing risk, it is determined that letter The security class and grade of breath system;
Security control selects and implemented module, to the security class and grade to information system, for the effective safety of its selection Control;
Information system is classified and grade classification module, the security evaluation of technology and non-technical link to information system security, and The evaluation of the final grade and the safe current state of system for providing information system security assurance ability;
Safety program module, the demand for security that said process is determined, security control are included in the safety program of information system;
Validation verification module, periodically by safety test and assessment come the validity of security control in scaling information system;
System authorization module, decide whether that authorization message system comes into operation by computer user;
Central processing unit, for receiving vena metacarpea data, voice print database, the human face data of man-machine operation module input, and extract Corresponding biological attribute data is sent to authentication module;The need after completion encryption for receiving man-machine operation module input The data to be stored, and be stored in after being classified by default sorting technique in corresponding database;For being recognized according to identity The identity authentication result that card is sent carries out the determination of data access authority, if authentication mistake, denied access;If identity is tested Card is correct, then is connected according to user right, central processing unit with addressable Database in database module;Pass through identity The user of checking sends access request by human-machine operation module and modification is asked, and access request and modification request are by encrypting mould Transmit to central processing unit and decrypt after block encryption, central processing unit is by calling configuration file to the database with access rights Conduct interviews, access after result encrypted by encrypting module, be sent to display screen decryption, checked for user, while according to authority, The data conversion for accessing the limit modification of result right of possession is sent to display screen into that can change form;Central processing unit will access every time Record stored.
Further, it is provided with fire wall between the central processing unit and risk evaluation module.
Further, the voice print database is the sound and fingerprint characteristic of user's checking text.
Further, the human face data is the face feature of user's checking text.
Further, the information collecting device of the human-machine operation module has photoelectricity fingerprint or image capture device, calculates Machine system safe opening unit, from lock unit and alarm unit.
Further, the safety program module is connected with a update module.
Further, the sound collection equipment is microphone, and fingerprint collecting equipment is fingerprint capturer.
The encryption method of the encrypting module has
1)The encryption below Internet, mainly for the protection of the data transmitted between communication node, is generally added solution link encryption The close encryption device by being placed on circuit is realized.Can be divided into again according to the method for synchronization of the data of transmission synchronous communication encryption and it is different Two kinds of communication encryption is walked, synchronous communication encryption includes byte of sync communication encryption and bit synchronization communication encryption again.
2)It is the improvement to link encryption.It is encrypted on protocol transport layer, mainly to source node and destination node Between transmission data protection is encrypted, similar with link encryption is that AES will be incorporated in the encryption for depending on node In module, the shortcomings that link encryption is subject to illegal access at node is overcome.
3)Encryption more than Internet is referred to as end to end security.It is network-oriented layer main body.To the data message of application layer It is encrypted, is easy to be realized with software, and cost is low, but cipher key management considerations are difficult, are mainly suitable for believing in large-scale network system Cease situation about being transmitted between multiple originating parties and debit.
Further, after often once being accessed, that is, a secret key renewal is carried out.
Further, the central processing unit is terminal.
Compared with prior art, the beneficial effects of the invention are as follows:The present invention is by implementing regularly risk assessment, with analysis Fragility existing for threat that information system faces, information system, security incident loss that information system is likely encountered and thus Caused risk;Meanwhile risk assessment will be that information system determines its demand for security;Then, should be determined according in risk assessment Information system in terms of confidentiality, integrity, and availability existing risk, determine the security class and grade of information system; To be that it selects effective security control, to realize suitable safe class for the security class and grade of information system;Really Fixed demand for security, security control by the safety program for being included in information system and are implemented, and hereafter, should periodically pass through safety Test and assessment come the validity of security control in scaling information system, i.e. information system security certification work, finally, based on peace The validity and residual risk value controlled entirely, determine whether information is used by user, the multiple checkings of the present invention are integrated, greatly The big security for improving computerized information, the only talent with modification authority can modify and watch to data, greatly The big security for improving information data.
Brief description of the drawings
Accompanying drawing is used for providing a further understanding of the present invention, and a part for constitution instruction, the reality with the present invention Apply example to be used to explain the present invention together, be not construed as limiting the invention.In the accompanying drawings:
Fig. 1 is present system block diagram.
Embodiment
The preferred embodiments of the present invention are illustrated below in conjunction with accompanying drawing, it will be appreciated that described herein preferred real Apply example to be merely to illustrate and explain the present invention, be not intended to limit the present invention.
Referring to Fig. 1, the present invention provides a kind of technical scheme:A kind of computer information safe system, including:Human-machine operation Module, for carrying out user's registration, and the biological characteristic model of the corresponding user's registration identity of generation is gathered, and will be biological special Sign model is saved in user registry database after being encrypted by encrypting module;For carrying out needing the input for storing data, and Central processing unit is sent to after the data inputted are encrypted by encrypting module;For inputting voice print database and human face data, And these data are sent to central processing unit;Operated for inputting formation access requests and data modification request and modification;
Authentication module, for the biological characteristic model in the biological attribute data and user registry database that receive to be entered Row similarity comparison, and the encrypting module being sent to after comparing result is calculated by the algorithm of setting in central processing unit Decoded;
Risk evaluation module, to analyze fragility existing for the threat, information system that information system faces, information system may The security incident loss run into and thus caused risk;Meanwhile risk assessment will be that information system determines its demand for security;With Afterwards, should according to the information system determined in risk assessment in terms of confidentiality, integrity, and availability existing risk, it is determined that letter The security class and grade of breath system;
Security control selects and implemented module, to the security class and grade to information system, for the effective safety of its selection Control;
Information system is classified and grade classification module, the security evaluation of technology and non-technical link to information system security, and The evaluation of the final grade and the safe current state of system for providing information system security assurance ability;
Safety program module, the demand for security that said process is determined, security control are included in the safety program of information system;
Validation verification module, periodically by safety test and assessment come the validity of security control in scaling information system;
System authorization module, decide whether that authorization message system comes into operation by computer user;
Central processing unit, for receiving vena metacarpea data, voice print database, the human face data of man-machine operation module input, and extract Corresponding biological attribute data is sent to authentication module;The need after completion encryption for receiving man-machine operation module input The data to be stored, and be stored in after being classified by default sorting technique in corresponding database;For being recognized according to identity The identity authentication result that card is sent carries out the determination of data access authority, if authentication mistake, denied access;If identity is tested Card is correct, then is connected according to user right, central processing unit with addressable Database in database module;Pass through identity The user of checking sends access request by human-machine operation module and modification is asked, and access request and modification request are by encrypting mould Transmit to central processing unit and decrypt after block encryption, central processing unit is by calling configuration file to the database with access rights Conduct interviews, access after result encrypted by encrypting module, be sent to display screen decryption, checked for user, while according to authority, The data conversion for accessing the limit modification of result right of possession is sent to display screen into that can change form;Central processing unit will access every time Record stored.
Further, fire wall is provided between central processing unit and risk evaluation module, certain protection can be carried out.
Further, voice print database is the sound and fingerprint characteristic of user's checking text.
Further, human face data is the face feature of user's checking text.
Further, the information collecting device of human-machine operation module has photoelectricity fingerprint or image capture device, department of computer science Unite safe opening unit, from lock unit and alarm unit.
Further, safety program module is connected with a update module, is easy to the data that upgrade in time.
Further, sound collection equipment is microphone, and fingerprint collecting equipment is fingerprint capturer, is convenient for data Collection.
The encryption method of encrypting module has
1)The encryption below Internet, mainly for the protection of the data transmitted between communication node, is generally added solution link encryption The close encryption device by being placed on circuit is realized.Can be divided into again according to the method for synchronization of the data of transmission synchronous communication encryption and it is different Two kinds of communication encryption is walked, synchronous communication encryption includes byte of sync communication encryption and bit synchronization communication encryption again.
2)It is the improvement to link encryption.It is encrypted on protocol transport layer, mainly to source node and destination node Between transmission data protection is encrypted, similar with link encryption is that AES will be incorporated in the encryption for depending on node In module, the shortcomings that link encryption is subject to illegal access at node is overcome.
3)Encryption more than Internet is referred to as end to end security.It is network-oriented layer main body.To the data message of application layer It is encrypted, is easy to be realized with software, and cost is low, but cipher key management considerations are difficult, are mainly suitable for believing in large-scale network system Cease situation about being transmitted between multiple originating parties and debit.
Further, after often once being accessed, that is, a secret key renewal is carried out, increases security.
Further, central processing unit is terminal.
The present invention is by implementing regularly risk assessment, to analyze existing for the threat, information system that information system faces Fragility, thus security incident that information system is likely encountered loss and caused risk;Meanwhile risk assessment will be information system System determines its demand for security;Then, should be according to the information system determined in risk assessment in confidentiality, integrity, and availability side Risk existing for face, determine the security class and grade of information system;To be it for the security class and grade of information system Effective security control is selected, to realize suitable safe class;Demand for security, the security control of determination will be included in information system The safety program of system is simultaneously implemented, and hereafter, periodically by safety test and should assess come security control in scaling information system Validity, i.e. information system security certification work, finally, validity and residual risk value based on security control, by using Person determines whether information is used, and the multiple checkings of the present invention are integrated, and substantially increase the security of computerized information, only have The talent for having modification authority can modify to data, substantially increase the security of information data.
Finally it should be noted that:The preferred embodiments of the present invention are the foregoing is only, are not intended to limit the invention, Although the present invention is described in detail with reference to the foregoing embodiments, for those skilled in the art, it still may be used To be modified to the technical scheme described in foregoing embodiments, or equivalent substitution is carried out to which part technical characteristic. Within the spirit and principles of the invention, any modification, equivalent substitution and improvements made etc., it should be included in the present invention's Within protection domain.

Claims (10)

1. a kind of computer information safe system, including:
Human-machine operation module, for carrying out user's registration, and gather the biological characteristic mould of the corresponding user's registration identity of generation Type, and be saved in after the biological characteristic model is encrypted by encrypting module in user registry database;For being needed The input of data is stored, and central processing unit is sent to after the data inputted are encrypted by encrypting module;For inputting sound Line data and human face data, and these data are sent to central processing unit;Repaiied for inputting formation access requests and data Change request and modification operation;
Authentication module, for the biological characteristic model in the biological attribute data and user registry database that receive to be entered Row similarity comparison, and the encrypting module being sent to after comparing result is calculated by the algorithm of setting in central processing unit Decoded;
Risk evaluation module, to analyze fragility existing for the threat, information system that information system faces, information system may The security incident loss run into and thus caused risk;Meanwhile risk assessment will be that information system determines its demand for security;With Afterwards, should according to the information system determined in risk assessment in terms of confidentiality, integrity, and availability existing risk, it is determined that letter The security class and grade of breath system;
Security control selects and implemented module, to the security class and grade to information system, for the effective safety of its selection Control;
Information system is classified and grade classification module, the security evaluation of technology and non-technical link to information system security, and The evaluation of the final grade and the safe current state of system for providing information system security assurance ability;
Safety program module, the demand for security that said process is determined, security control are included in the safety program of information system;
Validation verification module, periodically by safety test and assessment come the validity of security control in scaling information system;
System authorization module, decide whether that authorization message system comes into operation by computer user;
Central processing unit, for receiving vena metacarpea data, voice print database, the human face data of man-machine operation module input, and extract Corresponding biological attribute data is sent to authentication module;The need after completion encryption for receiving man-machine operation module input The data to be stored, and be stored in after being classified by default sorting technique in corresponding database;For being recognized according to identity The identity authentication result that card is sent carries out the determination of data access authority, if authentication mistake, denied access;If identity is tested Card is correct, then is connected according to user right, central processing unit with addressable Database in database module;Pass through identity The user of checking sends access request by human-machine operation module and modification is asked, and access request and modification request are by encrypting mould Transmit to central processing unit and decrypt after block encryption, central processing unit is by calling configuration file to the database with access rights Conduct interviews, access after result encrypted by encrypting module, be sent to display screen decryption, checked for user, while according to authority, The data conversion for accessing the limit modification of result right of possession is sent to display screen into that can change form;Central processing unit will access every time Record stored.
A kind of 2. computer information safe system according to claim 1, it is characterised in that:The central processing unit and wind Fire wall is provided between dangerous evaluation module.
A kind of 3. computer information safe system according to claim 1, it is characterised in that:The voice print database is user Verify the sound and fingerprint characteristic of text.
A kind of 4. computer information safe system according to claim 1, it is characterised in that:The human face data is user Verify the face feature of text.
A kind of 5. computer information safe system according to claim 1, it is characterised in that:The human-machine operation module Information collecting device has photoelectricity fingerprint or an image capture device, computer system security opening unit, single from lock unit and alarm Member.
A kind of 6. computer information safe system according to claim 1, it is characterised in that:The safety program module connects It is connected to a update module.
A kind of 7. computer information safe system according to claim 3, it is characterised in that:The sound collection equipment is Microphone, fingerprint collecting equipment are fingerprint capturer.
A kind of 8. computer information safe system according to claim 1, it is characterised in that:The encryption of the encrypting module Method has
1)The encryption below Internet, mainly for the protection of the data transmitted between communication node, is generally added solution link encryption The close encryption device by being placed on circuit is realized.Can be divided into again according to the method for synchronization of the data of transmission synchronous communication encryption and it is different Two kinds of communication encryption is walked, synchronous communication encryption includes byte of sync communication encryption and bit synchronization communication encryption again.
2)It is the improvement to link encryption.It is encrypted on protocol transport layer, mainly between source node and destination node Protection is encrypted in transmission data, and similar with link encryption is that AES will be incorporated in the encryption module for depending on node In, overcome the shortcomings that link encryption is subject to illegal access at node.
3)Encryption more than Internet is referred to as end to end security.It is network-oriented layer main body.The data message of application layer is carried out Encryption, is easy to be realized with software, and cost is low, but cipher key management considerations are difficult, are mainly suitable for information in large-scale network system and exist Situation about being transmitted between multiple originating parties and debit.
A kind of 9. computer information safe system according to claim 1, it is characterised in that:After often once being accessed, Carry out a secret key renewal.
A kind of 10. computer information safe system according to claim 1, it is characterised in that:The central processing unit is Terminal.
CN201711236445.XA 2017-11-30 2017-11-30 A kind of computer information safe system Pending CN107871081A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711236445.XA CN107871081A (en) 2017-11-30 2017-11-30 A kind of computer information safe system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711236445.XA CN107871081A (en) 2017-11-30 2017-11-30 A kind of computer information safe system

Publications (1)

Publication Number Publication Date
CN107871081A true CN107871081A (en) 2018-04-03

Family

ID=61755068

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711236445.XA Pending CN107871081A (en) 2017-11-30 2017-11-30 A kind of computer information safe system

Country Status (1)

Country Link
CN (1) CN107871081A (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109522694A (en) * 2018-11-20 2019-03-26 郑州升达经贸管理学院 A kind of identification system based on computer network
CN109951450A (en) * 2019-01-18 2019-06-28 苏州迈荣祥信息科技有限公司 A kind of information security collection and exchange method and system based on server
CN110380866A (en) * 2019-07-17 2019-10-25 中科恒运股份有限公司 One kind is about data safety level of protection management method
CN111079110A (en) * 2019-11-27 2020-04-28 国网辽宁省电力有限公司电力科学研究院 Power system network security protection method, system and device based on identity recognition
CN111428214A (en) * 2020-04-02 2020-07-17 乐观合芯物联网产业无锡有限公司 Multifunctional identity verification machine based on security module
CN112307441A (en) * 2020-10-13 2021-02-02 洛阳理工学院 Computer software protection system
CN112434270A (en) * 2020-11-27 2021-03-02 河南质量工程职业学院 Method and system for enhancing data security of computer system
CN113821774A (en) * 2021-09-07 2021-12-21 安徽继远软件有限公司 Terminal security risk module matching and verifying system
CN116151755A (en) * 2022-11-18 2023-05-23 深圳市东宝信息技术有限公司 Personnel information intelligent evaluation analysis system
CN117857225A (en) * 2024-03-07 2024-04-09 国网江西省电力有限公司电力科学研究院 Identity authentication system and method for new energy power station acquisition terminal

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103400027A (en) * 2013-07-09 2013-11-20 贵州大学 Risk assessment algorithm for information system
CN105740682A (en) * 2016-01-12 2016-07-06 黑河学院 Computer system as well as identification method and system of user thereof
CN105787324A (en) * 2016-02-03 2016-07-20 周口师范学院 Computer information security system
CN105975826A (en) * 2016-04-20 2016-09-28 中国石油大学(华东) Enterprise economic management information security system
CN106897462A (en) * 2017-03-13 2017-06-27 榆林学院 Data statistic analysis plateform system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103400027A (en) * 2013-07-09 2013-11-20 贵州大学 Risk assessment algorithm for information system
CN105740682A (en) * 2016-01-12 2016-07-06 黑河学院 Computer system as well as identification method and system of user thereof
CN105787324A (en) * 2016-02-03 2016-07-20 周口师范学院 Computer information security system
CN105975826A (en) * 2016-04-20 2016-09-28 中国石油大学(华东) Enterprise economic management information security system
CN106897462A (en) * 2017-03-13 2017-06-27 榆林学院 Data statistic analysis plateform system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
余成波等: "《计算机网络安全技术》", 31 August 2005, 北京工业大学出版社 *

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109522694A (en) * 2018-11-20 2019-03-26 郑州升达经贸管理学院 A kind of identification system based on computer network
CN109951450A (en) * 2019-01-18 2019-06-28 苏州迈荣祥信息科技有限公司 A kind of information security collection and exchange method and system based on server
CN110380866A (en) * 2019-07-17 2019-10-25 中科恒运股份有限公司 One kind is about data safety level of protection management method
CN111079110A (en) * 2019-11-27 2020-04-28 国网辽宁省电力有限公司电力科学研究院 Power system network security protection method, system and device based on identity recognition
CN111428214A (en) * 2020-04-02 2020-07-17 乐观合芯物联网产业无锡有限公司 Multifunctional identity verification machine based on security module
CN112307441A (en) * 2020-10-13 2021-02-02 洛阳理工学院 Computer software protection system
CN112434270A (en) * 2020-11-27 2021-03-02 河南质量工程职业学院 Method and system for enhancing data security of computer system
CN112434270B (en) * 2020-11-27 2022-10-14 河南质量工程职业学院 Method and system for enhancing data security of computer system
CN113821774A (en) * 2021-09-07 2021-12-21 安徽继远软件有限公司 Terminal security risk module matching and verifying system
CN116151755A (en) * 2022-11-18 2023-05-23 深圳市东宝信息技术有限公司 Personnel information intelligent evaluation analysis system
CN116151755B (en) * 2022-11-18 2024-02-02 深圳市东宝信息技术有限公司 Personnel information intelligent evaluation analysis system
CN117857225A (en) * 2024-03-07 2024-04-09 国网江西省电力有限公司电力科学研究院 Identity authentication system and method for new energy power station acquisition terminal

Similar Documents

Publication Publication Date Title
CN107871081A (en) A kind of computer information safe system
CN110601853B (en) Block chain private key generation method and equipment
EP3920119A1 (en) Methods for splitting and recovering key, program product, storage medium, and system
CN101272237B (en) Method and system for automatically generating and filling login information
CN105103488B (en) By the policy Enforcement of associated data
CN101442407B (en) Method and system for identification authentication using biology characteristics
CN104798083B (en) For the method and system of authentication-access request
CN108833114A (en) A kind of decentralization identity authorization system and method based on block chain
CN105933119B (en) A kind of authentication method and equipment
CN108989346A (en) The effective identity trustship agility of third party based on account concealment authenticates access module
CN107592308A (en) A kind of two server multiple-factor authentication method towards mobile payment scene
JP2007280181A (en) Electronic document processing program and electronic document processor
KR101809974B1 (en) A system for security certification generating authentication key combinating multi-user element and a method thereof
CN106533693A (en) Access method and device of railway vehicle monitoring and maintenance system
CN107040520A (en) A kind of cloud computing data-sharing systems and method
CN108882030A (en) A kind of monitor video classification encryption and decryption method and system based on time-domain information
CN101335754A (en) Method for information verification using remote server
CN107689957A (en) A kind of digital certificate management method, electronic equipment, storage medium
CN106650372A (en) open method and device of administrator authority
CN104639528A (en) DBA (database administrator) mobile client counterattack method and DBA mobile client counterattack device
CN110213232A (en) A kind of fingerprint characteristic and key double verification method and apparatus
CN102571341B (en) A kind of Verification System based on dynamic image and authentication method
CN109087102A (en) Transaction protection robot system based on block chain
CN107733936A (en) A kind of encryption method of mobile data
CN108900472A (en) The transmission method and device of information

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20180403