CN107871081A - A kind of computer information safe system - Google Patents
A kind of computer information safe system Download PDFInfo
- Publication number
- CN107871081A CN107871081A CN201711236445.XA CN201711236445A CN107871081A CN 107871081 A CN107871081 A CN 107871081A CN 201711236445 A CN201711236445 A CN 201711236445A CN 107871081 A CN107871081 A CN 107871081A
- Authority
- CN
- China
- Prior art keywords
- module
- data
- security
- encryption
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computing Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a kind of computer information safe system, including human-machine operation module, authentication module, risk evaluation module, security control selection and implement module, information system classification and grade classification module, safety program module, validation verification module, system authorization module and central processing unit, the multiple checkings of the present invention are integrated, substantially increase the security of computerized information, only the talent with modification authority can modify and watch to data, substantially increase the security of information data.
Description
Technical field
The present invention relates to mainboard, specially a kind of computer information safe system.
Background technology
With the fast development of computer technology and network so that computer has become people in work, study and life
Indispensable instrument in work, equally, the development of computer network, also bring the potential safety hazard of subscriber computer information, net
Network information stealth, information attack, viral transmission etc. all exist and occurred all the time, and the information of calculator memory storage has difference
Safe class, for example some in the absence of the file of confidentiality, some are related to the file of confidentiality, and existing computer is being set
When putting login authentication, after tentatively Information Authentication is completed, all different grades of files can be observed, it is very uneasy
Entirely, it is inconvenient for use.
So how to design a kind of computer information safe system, turning into us will currently solve the problems, such as.
The content of the invention
It is an object of the invention to provide a kind of computer information safe system, to solve what is proposed in above-mentioned background technology
Problem.
To achieve the above object, the present invention provides following technical scheme:A kind of computer information safe system, including it is man-machine
Operation module, for carrying out user's registration, and the biological characteristic model of the corresponding user's registration identity of generation is gathered, and by institute
State after biological characteristic model is encrypted by encrypting module and be saved in user registry database;For carrying out needing to store data
Input, and it is sent to central processing unit after the data inputted are encrypted by encrypting module;For inputting voice print database and people
Face data, and these data are sent to central processing unit;For inputting formation access requests and data modification request and repairing
Change operation;
Authentication module, for the biological characteristic model in the biological attribute data and user registry database that receive to be entered
Row similarity comparison, and the encrypting module being sent to after comparing result is calculated by the algorithm of setting in central processing unit
Decoded;
Risk evaluation module, to analyze fragility existing for the threat, information system that information system faces, information system may
The security incident loss run into and thus caused risk;Meanwhile risk assessment will be that information system determines its demand for security;With
Afterwards, should according to the information system determined in risk assessment in terms of confidentiality, integrity, and availability existing risk, it is determined that letter
The security class and grade of breath system;
Security control selects and implemented module, to the security class and grade to information system, for the effective safety of its selection
Control;
Information system is classified and grade classification module, the security evaluation of technology and non-technical link to information system security, and
The evaluation of the final grade and the safe current state of system for providing information system security assurance ability;
Safety program module, the demand for security that said process is determined, security control are included in the safety program of information system;
Validation verification module, periodically by safety test and assessment come the validity of security control in scaling information system;
System authorization module, decide whether that authorization message system comes into operation by computer user;
Central processing unit, for receiving vena metacarpea data, voice print database, the human face data of man-machine operation module input, and extract
Corresponding biological attribute data is sent to authentication module;The need after completion encryption for receiving man-machine operation module input
The data to be stored, and be stored in after being classified by default sorting technique in corresponding database;For being recognized according to identity
The identity authentication result that card is sent carries out the determination of data access authority, if authentication mistake, denied access;If identity is tested
Card is correct, then is connected according to user right, central processing unit with addressable Database in database module;Pass through identity
The user of checking sends access request by human-machine operation module and modification is asked, and access request and modification request are by encrypting mould
Transmit to central processing unit and decrypt after block encryption, central processing unit is by calling configuration file to the database with access rights
Conduct interviews, access after result encrypted by encrypting module, be sent to display screen decryption, checked for user, while according to authority,
The data conversion for accessing the limit modification of result right of possession is sent to display screen into that can change form;Central processing unit will access every time
Record stored.
Further, it is provided with fire wall between the central processing unit and risk evaluation module.
Further, the voice print database is the sound and fingerprint characteristic of user's checking text.
Further, the human face data is the face feature of user's checking text.
Further, the information collecting device of the human-machine operation module has photoelectricity fingerprint or image capture device, calculates
Machine system safe opening unit, from lock unit and alarm unit.
Further, the safety program module is connected with a update module.
Further, the sound collection equipment is microphone, and fingerprint collecting equipment is fingerprint capturer.
The encryption method of the encrypting module has
1)The encryption below Internet, mainly for the protection of the data transmitted between communication node, is generally added solution link encryption
The close encryption device by being placed on circuit is realized.Can be divided into again according to the method for synchronization of the data of transmission synchronous communication encryption and it is different
Two kinds of communication encryption is walked, synchronous communication encryption includes byte of sync communication encryption and bit synchronization communication encryption again.
2)It is the improvement to link encryption.It is encrypted on protocol transport layer, mainly to source node and destination node
Between transmission data protection is encrypted, similar with link encryption is that AES will be incorporated in the encryption for depending on node
In module, the shortcomings that link encryption is subject to illegal access at node is overcome.
3)Encryption more than Internet is referred to as end to end security.It is network-oriented layer main body.To the data message of application layer
It is encrypted, is easy to be realized with software, and cost is low, but cipher key management considerations are difficult, are mainly suitable for believing in large-scale network system
Cease situation about being transmitted between multiple originating parties and debit.
Further, after often once being accessed, that is, a secret key renewal is carried out.
Further, the central processing unit is terminal.
Compared with prior art, the beneficial effects of the invention are as follows:The present invention is by implementing regularly risk assessment, with analysis
Fragility existing for threat that information system faces, information system, security incident loss that information system is likely encountered and thus
Caused risk;Meanwhile risk assessment will be that information system determines its demand for security;Then, should be determined according in risk assessment
Information system in terms of confidentiality, integrity, and availability existing risk, determine the security class and grade of information system;
To be that it selects effective security control, to realize suitable safe class for the security class and grade of information system;Really
Fixed demand for security, security control by the safety program for being included in information system and are implemented, and hereafter, should periodically pass through safety
Test and assessment come the validity of security control in scaling information system, i.e. information system security certification work, finally, based on peace
The validity and residual risk value controlled entirely, determine whether information is used by user, the multiple checkings of the present invention are integrated, greatly
The big security for improving computerized information, the only talent with modification authority can modify and watch to data, greatly
The big security for improving information data.
Brief description of the drawings
Accompanying drawing is used for providing a further understanding of the present invention, and a part for constitution instruction, the reality with the present invention
Apply example to be used to explain the present invention together, be not construed as limiting the invention.In the accompanying drawings:
Fig. 1 is present system block diagram.
Embodiment
The preferred embodiments of the present invention are illustrated below in conjunction with accompanying drawing, it will be appreciated that described herein preferred real
Apply example to be merely to illustrate and explain the present invention, be not intended to limit the present invention.
Referring to Fig. 1, the present invention provides a kind of technical scheme:A kind of computer information safe system, including:Human-machine operation
Module, for carrying out user's registration, and the biological characteristic model of the corresponding user's registration identity of generation is gathered, and will be biological special
Sign model is saved in user registry database after being encrypted by encrypting module;For carrying out needing the input for storing data, and
Central processing unit is sent to after the data inputted are encrypted by encrypting module;For inputting voice print database and human face data,
And these data are sent to central processing unit;Operated for inputting formation access requests and data modification request and modification;
Authentication module, for the biological characteristic model in the biological attribute data and user registry database that receive to be entered
Row similarity comparison, and the encrypting module being sent to after comparing result is calculated by the algorithm of setting in central processing unit
Decoded;
Risk evaluation module, to analyze fragility existing for the threat, information system that information system faces, information system may
The security incident loss run into and thus caused risk;Meanwhile risk assessment will be that information system determines its demand for security;With
Afterwards, should according to the information system determined in risk assessment in terms of confidentiality, integrity, and availability existing risk, it is determined that letter
The security class and grade of breath system;
Security control selects and implemented module, to the security class and grade to information system, for the effective safety of its selection
Control;
Information system is classified and grade classification module, the security evaluation of technology and non-technical link to information system security, and
The evaluation of the final grade and the safe current state of system for providing information system security assurance ability;
Safety program module, the demand for security that said process is determined, security control are included in the safety program of information system;
Validation verification module, periodically by safety test and assessment come the validity of security control in scaling information system;
System authorization module, decide whether that authorization message system comes into operation by computer user;
Central processing unit, for receiving vena metacarpea data, voice print database, the human face data of man-machine operation module input, and extract
Corresponding biological attribute data is sent to authentication module;The need after completion encryption for receiving man-machine operation module input
The data to be stored, and be stored in after being classified by default sorting technique in corresponding database;For being recognized according to identity
The identity authentication result that card is sent carries out the determination of data access authority, if authentication mistake, denied access;If identity is tested
Card is correct, then is connected according to user right, central processing unit with addressable Database in database module;Pass through identity
The user of checking sends access request by human-machine operation module and modification is asked, and access request and modification request are by encrypting mould
Transmit to central processing unit and decrypt after block encryption, central processing unit is by calling configuration file to the database with access rights
Conduct interviews, access after result encrypted by encrypting module, be sent to display screen decryption, checked for user, while according to authority,
The data conversion for accessing the limit modification of result right of possession is sent to display screen into that can change form;Central processing unit will access every time
Record stored.
Further, fire wall is provided between central processing unit and risk evaluation module, certain protection can be carried out.
Further, voice print database is the sound and fingerprint characteristic of user's checking text.
Further, human face data is the face feature of user's checking text.
Further, the information collecting device of human-machine operation module has photoelectricity fingerprint or image capture device, department of computer science
Unite safe opening unit, from lock unit and alarm unit.
Further, safety program module is connected with a update module, is easy to the data that upgrade in time.
Further, sound collection equipment is microphone, and fingerprint collecting equipment is fingerprint capturer, is convenient for data
Collection.
The encryption method of encrypting module has
1)The encryption below Internet, mainly for the protection of the data transmitted between communication node, is generally added solution link encryption
The close encryption device by being placed on circuit is realized.Can be divided into again according to the method for synchronization of the data of transmission synchronous communication encryption and it is different
Two kinds of communication encryption is walked, synchronous communication encryption includes byte of sync communication encryption and bit synchronization communication encryption again.
2)It is the improvement to link encryption.It is encrypted on protocol transport layer, mainly to source node and destination node
Between transmission data protection is encrypted, similar with link encryption is that AES will be incorporated in the encryption for depending on node
In module, the shortcomings that link encryption is subject to illegal access at node is overcome.
3)Encryption more than Internet is referred to as end to end security.It is network-oriented layer main body.To the data message of application layer
It is encrypted, is easy to be realized with software, and cost is low, but cipher key management considerations are difficult, are mainly suitable for believing in large-scale network system
Cease situation about being transmitted between multiple originating parties and debit.
Further, after often once being accessed, that is, a secret key renewal is carried out, increases security.
Further, central processing unit is terminal.
The present invention is by implementing regularly risk assessment, to analyze existing for the threat, information system that information system faces
Fragility, thus security incident that information system is likely encountered loss and caused risk;Meanwhile risk assessment will be information system
System determines its demand for security;Then, should be according to the information system determined in risk assessment in confidentiality, integrity, and availability side
Risk existing for face, determine the security class and grade of information system;To be it for the security class and grade of information system
Effective security control is selected, to realize suitable safe class;Demand for security, the security control of determination will be included in information system
The safety program of system is simultaneously implemented, and hereafter, periodically by safety test and should assess come security control in scaling information system
Validity, i.e. information system security certification work, finally, validity and residual risk value based on security control, by using
Person determines whether information is used, and the multiple checkings of the present invention are integrated, and substantially increase the security of computerized information, only have
The talent for having modification authority can modify to data, substantially increase the security of information data.
Finally it should be noted that:The preferred embodiments of the present invention are the foregoing is only, are not intended to limit the invention,
Although the present invention is described in detail with reference to the foregoing embodiments, for those skilled in the art, it still may be used
To be modified to the technical scheme described in foregoing embodiments, or equivalent substitution is carried out to which part technical characteristic.
Within the spirit and principles of the invention, any modification, equivalent substitution and improvements made etc., it should be included in the present invention's
Within protection domain.
Claims (10)
1. a kind of computer information safe system, including:
Human-machine operation module, for carrying out user's registration, and gather the biological characteristic mould of the corresponding user's registration identity of generation
Type, and be saved in after the biological characteristic model is encrypted by encrypting module in user registry database;For being needed
The input of data is stored, and central processing unit is sent to after the data inputted are encrypted by encrypting module;For inputting sound
Line data and human face data, and these data are sent to central processing unit;Repaiied for inputting formation access requests and data
Change request and modification operation;
Authentication module, for the biological characteristic model in the biological attribute data and user registry database that receive to be entered
Row similarity comparison, and the encrypting module being sent to after comparing result is calculated by the algorithm of setting in central processing unit
Decoded;
Risk evaluation module, to analyze fragility existing for the threat, information system that information system faces, information system may
The security incident loss run into and thus caused risk;Meanwhile risk assessment will be that information system determines its demand for security;With
Afterwards, should according to the information system determined in risk assessment in terms of confidentiality, integrity, and availability existing risk, it is determined that letter
The security class and grade of breath system;
Security control selects and implemented module, to the security class and grade to information system, for the effective safety of its selection
Control;
Information system is classified and grade classification module, the security evaluation of technology and non-technical link to information system security, and
The evaluation of the final grade and the safe current state of system for providing information system security assurance ability;
Safety program module, the demand for security that said process is determined, security control are included in the safety program of information system;
Validation verification module, periodically by safety test and assessment come the validity of security control in scaling information system;
System authorization module, decide whether that authorization message system comes into operation by computer user;
Central processing unit, for receiving vena metacarpea data, voice print database, the human face data of man-machine operation module input, and extract
Corresponding biological attribute data is sent to authentication module;The need after completion encryption for receiving man-machine operation module input
The data to be stored, and be stored in after being classified by default sorting technique in corresponding database;For being recognized according to identity
The identity authentication result that card is sent carries out the determination of data access authority, if authentication mistake, denied access;If identity is tested
Card is correct, then is connected according to user right, central processing unit with addressable Database in database module;Pass through identity
The user of checking sends access request by human-machine operation module and modification is asked, and access request and modification request are by encrypting mould
Transmit to central processing unit and decrypt after block encryption, central processing unit is by calling configuration file to the database with access rights
Conduct interviews, access after result encrypted by encrypting module, be sent to display screen decryption, checked for user, while according to authority,
The data conversion for accessing the limit modification of result right of possession is sent to display screen into that can change form;Central processing unit will access every time
Record stored.
A kind of 2. computer information safe system according to claim 1, it is characterised in that:The central processing unit and wind
Fire wall is provided between dangerous evaluation module.
A kind of 3. computer information safe system according to claim 1, it is characterised in that:The voice print database is user
Verify the sound and fingerprint characteristic of text.
A kind of 4. computer information safe system according to claim 1, it is characterised in that:The human face data is user
Verify the face feature of text.
A kind of 5. computer information safe system according to claim 1, it is characterised in that:The human-machine operation module
Information collecting device has photoelectricity fingerprint or an image capture device, computer system security opening unit, single from lock unit and alarm
Member.
A kind of 6. computer information safe system according to claim 1, it is characterised in that:The safety program module connects
It is connected to a update module.
A kind of 7. computer information safe system according to claim 3, it is characterised in that:The sound collection equipment is
Microphone, fingerprint collecting equipment are fingerprint capturer.
A kind of 8. computer information safe system according to claim 1, it is characterised in that:The encryption of the encrypting module
Method has
1)The encryption below Internet, mainly for the protection of the data transmitted between communication node, is generally added solution link encryption
The close encryption device by being placed on circuit is realized.Can be divided into again according to the method for synchronization of the data of transmission synchronous communication encryption and it is different
Two kinds of communication encryption is walked, synchronous communication encryption includes byte of sync communication encryption and bit synchronization communication encryption again.
2)It is the improvement to link encryption.It is encrypted on protocol transport layer, mainly between source node and destination node
Protection is encrypted in transmission data, and similar with link encryption is that AES will be incorporated in the encryption module for depending on node
In, overcome the shortcomings that link encryption is subject to illegal access at node.
3)Encryption more than Internet is referred to as end to end security.It is network-oriented layer main body.The data message of application layer is carried out
Encryption, is easy to be realized with software, and cost is low, but cipher key management considerations are difficult, are mainly suitable for information in large-scale network system and exist
Situation about being transmitted between multiple originating parties and debit.
A kind of 9. computer information safe system according to claim 1, it is characterised in that:After often once being accessed,
Carry out a secret key renewal.
A kind of 10. computer information safe system according to claim 1, it is characterised in that:The central processing unit is
Terminal.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711236445.XA CN107871081A (en) | 2017-11-30 | 2017-11-30 | A kind of computer information safe system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711236445.XA CN107871081A (en) | 2017-11-30 | 2017-11-30 | A kind of computer information safe system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107871081A true CN107871081A (en) | 2018-04-03 |
Family
ID=61755068
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711236445.XA Pending CN107871081A (en) | 2017-11-30 | 2017-11-30 | A kind of computer information safe system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107871081A (en) |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109522694A (en) * | 2018-11-20 | 2019-03-26 | 郑州升达经贸管理学院 | A kind of identification system based on computer network |
CN109951450A (en) * | 2019-01-18 | 2019-06-28 | 苏州迈荣祥信息科技有限公司 | A kind of information security collection and exchange method and system based on server |
CN110380866A (en) * | 2019-07-17 | 2019-10-25 | 中科恒运股份有限公司 | One kind is about data safety level of protection management method |
CN111079110A (en) * | 2019-11-27 | 2020-04-28 | 国网辽宁省电力有限公司电力科学研究院 | Power system network security protection method, system and device based on identity recognition |
CN111428214A (en) * | 2020-04-02 | 2020-07-17 | 乐观合芯物联网产业无锡有限公司 | Multifunctional identity verification machine based on security module |
CN112307441A (en) * | 2020-10-13 | 2021-02-02 | 洛阳理工学院 | Computer software protection system |
CN112434270A (en) * | 2020-11-27 | 2021-03-02 | 河南质量工程职业学院 | Method and system for enhancing data security of computer system |
CN113821774A (en) * | 2021-09-07 | 2021-12-21 | 安徽继远软件有限公司 | Terminal security risk module matching and verifying system |
CN116151755A (en) * | 2022-11-18 | 2023-05-23 | 深圳市东宝信息技术有限公司 | Personnel information intelligent evaluation analysis system |
CN117857225A (en) * | 2024-03-07 | 2024-04-09 | 国网江西省电力有限公司电力科学研究院 | Identity authentication system and method for new energy power station acquisition terminal |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103400027A (en) * | 2013-07-09 | 2013-11-20 | 贵州大学 | Risk assessment algorithm for information system |
CN105740682A (en) * | 2016-01-12 | 2016-07-06 | 黑河学院 | Computer system as well as identification method and system of user thereof |
CN105787324A (en) * | 2016-02-03 | 2016-07-20 | 周口师范学院 | Computer information security system |
CN105975826A (en) * | 2016-04-20 | 2016-09-28 | 中国石油大学(华东) | Enterprise economic management information security system |
CN106897462A (en) * | 2017-03-13 | 2017-06-27 | 榆林学院 | Data statistic analysis plateform system |
-
2017
- 2017-11-30 CN CN201711236445.XA patent/CN107871081A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103400027A (en) * | 2013-07-09 | 2013-11-20 | 贵州大学 | Risk assessment algorithm for information system |
CN105740682A (en) * | 2016-01-12 | 2016-07-06 | 黑河学院 | Computer system as well as identification method and system of user thereof |
CN105787324A (en) * | 2016-02-03 | 2016-07-20 | 周口师范学院 | Computer information security system |
CN105975826A (en) * | 2016-04-20 | 2016-09-28 | 中国石油大学(华东) | Enterprise economic management information security system |
CN106897462A (en) * | 2017-03-13 | 2017-06-27 | 榆林学院 | Data statistic analysis plateform system |
Non-Patent Citations (1)
Title |
---|
余成波等: "《计算机网络安全技术》", 31 August 2005, 北京工业大学出版社 * |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109522694A (en) * | 2018-11-20 | 2019-03-26 | 郑州升达经贸管理学院 | A kind of identification system based on computer network |
CN109951450A (en) * | 2019-01-18 | 2019-06-28 | 苏州迈荣祥信息科技有限公司 | A kind of information security collection and exchange method and system based on server |
CN110380866A (en) * | 2019-07-17 | 2019-10-25 | 中科恒运股份有限公司 | One kind is about data safety level of protection management method |
CN111079110A (en) * | 2019-11-27 | 2020-04-28 | 国网辽宁省电力有限公司电力科学研究院 | Power system network security protection method, system and device based on identity recognition |
CN111428214A (en) * | 2020-04-02 | 2020-07-17 | 乐观合芯物联网产业无锡有限公司 | Multifunctional identity verification machine based on security module |
CN112307441A (en) * | 2020-10-13 | 2021-02-02 | 洛阳理工学院 | Computer software protection system |
CN112434270A (en) * | 2020-11-27 | 2021-03-02 | 河南质量工程职业学院 | Method and system for enhancing data security of computer system |
CN112434270B (en) * | 2020-11-27 | 2022-10-14 | 河南质量工程职业学院 | Method and system for enhancing data security of computer system |
CN113821774A (en) * | 2021-09-07 | 2021-12-21 | 安徽继远软件有限公司 | Terminal security risk module matching and verifying system |
CN116151755A (en) * | 2022-11-18 | 2023-05-23 | 深圳市东宝信息技术有限公司 | Personnel information intelligent evaluation analysis system |
CN116151755B (en) * | 2022-11-18 | 2024-02-02 | 深圳市东宝信息技术有限公司 | Personnel information intelligent evaluation analysis system |
CN117857225A (en) * | 2024-03-07 | 2024-04-09 | 国网江西省电力有限公司电力科学研究院 | Identity authentication system and method for new energy power station acquisition terminal |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107871081A (en) | A kind of computer information safe system | |
CN110601853B (en) | Block chain private key generation method and equipment | |
EP3920119A1 (en) | Methods for splitting and recovering key, program product, storage medium, and system | |
CN101272237B (en) | Method and system for automatically generating and filling login information | |
CN105103488B (en) | By the policy Enforcement of associated data | |
CN101442407B (en) | Method and system for identification authentication using biology characteristics | |
CN104798083B (en) | For the method and system of authentication-access request | |
CN108833114A (en) | A kind of decentralization identity authorization system and method based on block chain | |
CN105933119B (en) | A kind of authentication method and equipment | |
CN108989346A (en) | The effective identity trustship agility of third party based on account concealment authenticates access module | |
CN107592308A (en) | A kind of two server multiple-factor authentication method towards mobile payment scene | |
JP2007280181A (en) | Electronic document processing program and electronic document processor | |
KR101809974B1 (en) | A system for security certification generating authentication key combinating multi-user element and a method thereof | |
CN106533693A (en) | Access method and device of railway vehicle monitoring and maintenance system | |
CN107040520A (en) | A kind of cloud computing data-sharing systems and method | |
CN108882030A (en) | A kind of monitor video classification encryption and decryption method and system based on time-domain information | |
CN101335754A (en) | Method for information verification using remote server | |
CN107689957A (en) | A kind of digital certificate management method, electronic equipment, storage medium | |
CN106650372A (en) | open method and device of administrator authority | |
CN104639528A (en) | DBA (database administrator) mobile client counterattack method and DBA mobile client counterattack device | |
CN110213232A (en) | A kind of fingerprint characteristic and key double verification method and apparatus | |
CN102571341B (en) | A kind of Verification System based on dynamic image and authentication method | |
CN109087102A (en) | Transaction protection robot system based on block chain | |
CN107733936A (en) | A kind of encryption method of mobile data | |
CN108900472A (en) | The transmission method and device of information |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180403 |