CN108063767B - Online detection method and device, computer and storage medium - Google Patents

Online detection method and device, computer and storage medium Download PDF

Info

Publication number
CN108063767B
CN108063767B CN201711430478.8A CN201711430478A CN108063767B CN 108063767 B CN108063767 B CN 108063767B CN 201711430478 A CN201711430478 A CN 201711430478A CN 108063767 B CN108063767 B CN 108063767B
Authority
CN
China
Prior art keywords
information
equipment
logging
sending
bound
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201711430478.8A
Other languages
Chinese (zh)
Other versions
CN108063767A (en
Inventor
杨承其
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Mehdi Houstton Medicalsystem Technology Co ltd
Original Assignee
Suzhou Mehdi Houstton Medicalsystem Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suzhou Mehdi Houstton Medicalsystem Technology Co ltd filed Critical Suzhou Mehdi Houstton Medicalsystem Technology Co ltd
Priority to CN201711430478.8A priority Critical patent/CN108063767B/en
Publication of CN108063767A publication Critical patent/CN108063767A/en
Application granted granted Critical
Publication of CN108063767B publication Critical patent/CN108063767B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/107Network architectures or network communication protocols for network security for controlling access to devices or network resources wherein the security policies are location-dependent, e.g. entities privileges depend on current location or allowing specific operations only from locally connected terminals

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Alarm Systems (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The embodiment of the invention discloses an online detection method, an online detection device, a computer and a storage medium. The method comprises the following steps: after logging in the system, acquiring equipment information bound with the system; periodically detecting whether the equipment is in a safety range according to the equipment information; and if the equipment is out of the safety range, logging out and removing logging information. The embodiment of the invention solves the problem that a third party operates or steals system information when a user is far away from a terminal for logging in the system, and reduces the security risk.

Description

Online detection method and device, computer and storage medium
Technical Field
The embodiment of the invention relates to computer technology, in particular to an online detection method, an online detection device, a computer and a storage medium.
Background
With the continuous development of computer technology and network technology, in order to ensure network security, personal information of users is required to be logged in each website, and meanwhile, a large amount of user sensitive information may be contained in the network. When the user logs out and logs in, the user is far away from the terminal logging in the system, the possibility of being operated by a third party exists, the problem of data leakage such as personal information or sensitive information of the user is easily caused, and the safety risk is high.
Disclosure of Invention
The invention provides an online detection method, an online detection device, a computer and a storage medium, which are used for automatically monitoring the online state of a user and reducing the network security risk.
In a first aspect, an embodiment of the present invention provides an online detection method, where the method includes:
after logging in the system, acquiring equipment information bound with the system;
periodically detecting whether the equipment is in a safety range according to the equipment information;
and if the equipment is out of the safety range, logging out and removing logging information.
In a second aspect, an embodiment of the present invention further provides an online detection apparatus, where the apparatus includes:
the device information acquisition module is used for acquiring device information bound with the system after logging in the system;
the equipment detection module is used for periodically detecting whether the equipment is in a safety range according to the equipment information;
and the first logout module is used for logging out and clearing login information if the equipment is out of the safety range.
In a third aspect, an embodiment of the present invention further provides a computer device, where the computer device includes a memory, a processor, and a computer program stored in the memory and executable on the processor, and when the processor executes the computer program, the online detection method provided in any embodiment of the present invention is implemented.
Fourth, the embodiment of the present invention further provides a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the online detection method provided in any embodiment of the present invention.
According to the embodiment of the invention, after logging in the system, the equipment information bound with the system is acquired, the wireless signal transmitted by the equipment matched with the equipment information is received, whether the equipment carried by the user is in a safety range is determined according to the wireless signal, when the equipment is out of the safety range, the user is determined to be out of the safety range, logging-in is cancelled, and logging-in information is eliminated, so that the problem that a third party operates or steals the system information when the user is far away from a terminal of the logging-in system is solved, and the safety risk is reduced.
Drawings
Fig. 1 is a flowchart of an online detection method according to an embodiment of the present invention;
fig. 2 is a schematic structural diagram of an online detection device according to a second embodiment of the present invention;
fig. 3 is a schematic structural diagram of a computer device according to a third embodiment of the present invention.
Detailed Description
The present invention will be described in further detail with reference to the accompanying drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of the invention and are not limiting of the invention. It should be further noted that, for the convenience of description, only some of the structures related to the present invention are shown in the drawings, not all of the structures.
Example one
Fig. 1 is a flowchart of an online detection method according to an embodiment of the present invention, where the present embodiment is applicable to monitoring an online state of a user in real time after logging in a system, and the method may be executed by an online detection device according to an embodiment of the present invention, and the online detection device may be implemented in a software and/or hardware manner. The method specifically comprises the following steps:
and S110, after logging in the system, acquiring the equipment information bound with the system.
The system is a website, a terminal system or an APP (Application program) containing personal information, confidential information or sensitive information, and may be, for example and without limitation, a personal payment system, a personal financing system, a company business system, a company account system, and the like. The current terminal refers to a terminal applied to a login system, and may be an intelligent device such as a desktop computer, a notebook computer, or a tablet phone, and the login information may include, but is not limited to, a user name, mailbox information, a phone number, a micro signal, and the like. The device information may be information related to a device bound to the system, for example, the device information may be ID (Identity) information of the bound device, and the device may be a portable mobile terminal such as a smart phone, a smart band, or a smart watch, and may also be a portable radio frequency device such as a work card or a radio frequency card having a wireless signal sending function.
Optionally, after the device information bound to the system is acquired, prompt information is sent to the corresponding device according to the device information, where the prompt information is used to prompt the user to carry the device with him, so as to avoid the problem of inaccurate detection caused by separation of the device from the user.
And S120, periodically detecting whether the equipment is in a safety range according to the equipment information.
The safety range refers to a monitoring range of the current terminal by the user, and may be, for example, a visible range of the current terminal by the user. In this embodiment, the device bound to the system may be carried around, and if the device bound to the system is within the security range, it may be determined that the user is within the security range.
In this embodiment, the safety range may be a circular area with the current terminal as a center, and the radius of the safety range may be adjusted according to a user requirement or an environment where the current terminal is located.
Optionally, before periodically detecting whether the device is within the safety range according to the device information, the method further includes: and sending starting information to the equipment according to the equipment information so that the equipment transmits a wireless signal according to the starting information. The starting information is used for indicating the equipment to start a WIreless signal transmitting module, the WIreless signal transmitting module can be a Wi-Fi (WIreless-Fidelity) module or a bluetooth module, and the WIreless signal transmitting module can also be an infrared transmitter. Correspondingly, the wireless signal may also be an infrared signal.
Optionally, periodically detecting whether the device is in the safety range according to the device information, including: receiving a wireless signal carrying an equipment identifier; if the equipment identification is matched with the equipment information, determining the distance between the equipment and the terminal according to the strength of the wireless signal; and if the distance is greater than the safety distance, determining that the equipment is out of the safety range.
Optionally, a signal receiver is disposed in the current terminal, and is configured to receive the wireless signal. After receiving the start information, the device bound to the system starts the wireless signal transmitting module and transmits a wireless signal, and the wireless signal carries a device identifier of the device, where the device identifier may be ID information of the device.
The current terminal receives a plurality of wireless signals, compares the equipment identification of the wireless signals with the equipment information, screens the wireless signals matched with the equipment information, and discards the wireless signals unmatched with the equipment information. And acquiring the signal intensity of the wireless signal matched with the equipment information, and calculating the distance between the equipment and the current terminal. Alternatively, the distance between the device and the current terminal may be determined by a RSSI (Received Signal Strength Indication) ranging method, and the relationship between the transmission and reception powers of the wireless signals may be represented by the following formula: pR=PT/rn. Wherein P isRIs the received power of the current terminal, related to the signal strength received by the electronic stub, PTThe transmission power of the equipment is fixed, r is the distance between the signal to be measured and the electronic vehicle stub, n is a propagation factor, the value of the propagation factor depends on the environment of wireless transmission, and n is a fixed value under a specific environment.
In this embodiment, after determining the distance between the device and the current terminal according to the strength of the wireless signal received by the current terminal, it is determined whether the device is within the safety range of the current terminal, and if the distance between the device and the current terminal is less than or equal to the safety distance, the device is determined to be within the safety range; and if the distance between the equipment and the current terminal is greater than the safety distance, determining that the equipment is out of the safety range. Wherein the safe distance may be a radius of the safe range.
Optionally, a signal shielding device is arranged in the current terminal, and according to an angle set by a user, wireless signals within a receiving set angle range can be shielded from wireless signals outside the set angle, wherein the receiving angle can be set according to the environment where the current terminal is located or the user requirement, so as to improve the accuracy of the safety range.
In this embodiment, the wireless signal transmitted by the device is periodically received according to a preset frequency, and the preset frequency may be, for example, 6 times/h or 4 times/h. If the device is detected to be out of the safety range, step S130 is executed, and if the device is detected to be in the safety range, the next device detection is waited for.
Optionally, after sending the start information to the device according to the device information, the method further includes: if the wireless signal transmitted by the equipment is not received, determining at least one verification equipment according to the equipment information or the login information, and sending verification information to the verification equipment; and if the system is determined to be non-safe login according to the feedback information of the verification equipment, logging out, removing login information and sending alarm information to the verification equipment.
In this embodiment, after the preset time for sending the start information to the device according to the device information, if the wireless signal transmitted by the device is not received, it is determined that the current system is logged in by the third party, and the verification information is sent to the device bound to the system according to the device information, where the verification information may be used to inform the user that the device has the third party logged in, and ask whether the device belongs to authorized login. If the current login belongs to authorized login according to the feedback information of the user, the current login is determined to be safe login; if the feedback information is not received or the feedback information indicates that the current login belongs to unauthorized login, the current login is determined to be non-secure login, the login is cancelled, the login information is cleared, and alarm information is sent to the verification device. Optionally, if the current login is a non-secure login, the current login information is locked, and the user needs to unlock the current login information through the pre-stored unlocking information, where the unlocking information may be, but is not limited to, fingerprint information, face information, iris information, or the like of the user.
Optionally, a plurality of communication modes of the user, such as a mobile phone number, a micro signal or a mailbox, can be acquired through the login information, and the verification information is sent to the user, so that the problem that the user cannot receive the verification information in time is avoided.
And S130, if the equipment is out of the safety range, logging out and removing logging information.
In the embodiment, when the device is detected to be out of the safety range, it is determined that the user is out of the safety range, the current login system cannot be monitored safely, login exits and login information is cleared, the problem that a third party operates the system or login of the third party is carried out according to the login information stored in the terminal when the user is far away from the current terminal is solved, network safety is improved, and the risk of information loss is reduced.
According to the technical scheme, after the user logs in the system, the device information bound with the system is obtained, the wireless signal transmitted by the device matched with the device information is received, whether the device carried by the user is in a safety range or not is determined according to the wireless signal, when the device is out of the safety range, the user is determined to be out of the safety range, logging is cancelled, logging information is removed, the problem that a third party operates or steals system information when the user is far away from a terminal of the logging system is solved, and safety risks are reduced.
In one embodiment, after logging in a system, if the device information bound with the system does not exist, determining at least one device to be bound according to the login information, and sending the binding information to the device to be bound.
In this embodiment, binding information may be sent to the user in a manner of a mobile phone number, mailbox information, a micro signal, or the like in the login information, a prompt message may be sent at the current terminal, and optionally, a device corresponding to a communication manner such as a mobile phone number, a micro signal, or the like in the login information is determined as the device to be bound.
Optionally, after the binding information is sent, when the feedback information is not received, the second online detection mode is started. The second online detection mode comprises the step of recording the operation state and the operation time of input equipment of the current terminal, wherein the input equipment can be a keyboard, a mouse or a touch screen. And if no input operation exists currently and the time from the last input operation is greater than a first time threshold, logging out and removing logging information.
Example two
Fig. 2 is a schematic structural diagram of an online detection device provided in the second embodiment of the present invention, where the online detection device specifically includes:
the device information obtaining module 210 is configured to obtain device information bound to the system after logging in the system;
the device detection module 220 is configured to periodically detect whether the device is within a safety range according to the device information;
the first logout module 230 is configured to logout and log in if the device is outside the security range, and clear login information.
Optionally, the apparatus further comprises:
and the information sending module is used for sending the starting information to the equipment according to the equipment information before periodically detecting whether the equipment is in the safety range according to the equipment information so as to enable the equipment to emit a wireless signal according to the starting information.
Optionally, the device detection module 220 includes:
the signal receiving unit is used for receiving a wireless signal carrying an equipment identifier;
the distance determining unit is used for determining the distance between the equipment and the terminal according to the strength of the wireless signal if the equipment identifier is matched with the equipment information;
and the equipment detection unit is used for determining that the equipment is out of the safety range if the distance is greater than the safety distance.
Optionally, the apparatus further comprises:
the verification information sending module is used for determining at least one verification device according to the device information or the login information and sending verification information to the verification device if a wireless signal transmitted by the device is not received after the starting information is sent to the device according to the device information;
and the second logout module is used for logging out if the system is determined to be non-safe login according to the feedback information of the verification equipment, clearing login information and sending alarm information to the verification equipment.
Optionally, the apparatus further comprises: and the binding module is used for determining at least one device to be bound according to the login information and sending the binding information to the device to be bound if the device information bound with the system does not exist.
The online detection device provided by the embodiment of the invention can execute the online detection method provided by any embodiment of the invention, and has corresponding functional modules and beneficial effects for executing the online detection method.
EXAMPLE III
Fig. 3 is a schematic structural diagram of a computing device according to a third embodiment of the present invention. FIG. 3 illustrates a block diagram of an exemplary computing device 12 suitable for use in implementing embodiments of the present invention. The computing device 12 shown in FIG. 3 is only one example and should not be taken to limit the scope of use and functionality of embodiments of the present invention.
As shown in fig. 3, computing device 12 may comprise an electronic device with computing processing capabilities, and the types may include, but are not limited to, a terminal device, such as a mobile terminal, a PC, and the like, and a server device, such as a server or a computer cluster, and the like. Components of computing device 12 may include, but are not limited to: one or more processors or processing units 16, a system memory 28, and a bus 18 that couples various system components including the system memory 28 and the processing unit 16.
Bus 18 represents one or more of any of several types of bus structures, including a memory bus or memory controller, a peripheral bus, an accelerated graphics port, and a processor or local bus using any of a variety of bus architectures. By way of example, such architectures include, but are not limited to, Industry Standard Architecture (ISA) bus, micro-channel architecture (MAC) bus, enhanced ISA bus, Video Electronics Standards Association (VESA) local bus, and Peripheral Component Interconnect (PCI) bus.
Computing device 12 typically includes a variety of computer system readable media. Such media may be any available media that is accessible by computing device 12 and includes both volatile and nonvolatile media, removable and non-removable media.
The system memory 28 may include computer system readable media in the form of volatile memory, such as Random Access Memory (RAM)30 and/or cache memory 32. Computing device 12 may further include other removable/non-removable, volatile/nonvolatile computer system storage media. By way of example only, storage system 34 may be used to read from and write to non-removable, nonvolatile magnetic media (not shown in FIG. 3, and commonly referred to as a "hard drive"). Although not shown in FIG. 3, a magnetic disk drive for reading from and writing to a removable, nonvolatile magnetic disk (e.g., a "floppy disk") and an optical disk drive for reading from or writing to a removable, nonvolatile optical disk (e.g., a CD-ROM, DVD-ROM, or other optical media) may be provided. In these cases, each drive may be connected to bus 18 by one or more data media interfaces. Memory 28 may include at least one program product having a set (e.g., at least one) of program modules that are configured to carry out the functions of embodiments of the invention.
A program/utility 40 having a set (at least one) of program modules 42 may be stored, for example, in memory 28, such program modules 42 including, but not limited to, an operating system, one or more application programs, other program modules, and program data, each of which examples or some combination thereof may comprise an implementation of a network environment. Program modules 42 generally carry out the functions and/or methodologies of the described embodiments of the invention.
Computing device 12 may also communicate with one or more external devices 14 (e.g., keyboard, pointing device, display 24, etc.), with one or more devices that enable a user to interact with computing device 12, and/or with any devices (e.g., network card, modem, etc.) that enable computing device 12 to communicate with one or more other computing devices. Such communication may be through an input/output (I/O) interface 22. Also, computing device 12 may communicate with one or more networks (e.g., a Local Area Network (LAN), a Wide Area Network (WAN), and/or a public network, such as the internet) through network adapter 20. As shown, network adapter 20 communicates with the other modules of computing device 12 via bus 18. It should be appreciated that although not shown in the figures, other hardware and/or software modules may be used in conjunction with computing device 12, including but not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, RAID systems, tape drives, and data backup storage systems, among others.
The processing unit 16 may include, but is not limited to, a Central Processing Unit (CPU) and/or a Graphics Processing Unit (GPU), and executes programs stored in the system memory 28 to perform various functional applications and data processing, such as implementing any of the online detection methods provided by the embodiments of the present invention: after logging in the system, acquiring equipment information bound with the system; periodically detecting whether the equipment is in a safety range according to the equipment information; and if the equipment is out of the safety range, logging out and removing logging information.
Example four
A fourth embodiment of the present invention provides a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the line detection method provided in the fourth embodiment of the present invention: after logging in the system, acquiring equipment information bound with the system; periodically detecting whether the equipment is in a safety range according to the equipment information; and if the equipment is out of the safety range, logging out and removing logging information.
Any combination of one or more computer-readable media may be employed. The computer readable medium may be a computer readable signal medium or a computer readable storage medium. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples (a non-exhaustive list) of the computer readable storage medium would include the following: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this document, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
A computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Computer program code for carrying out operations for aspects of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, Smalltalk, C + + or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any type of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet service provider).
It is to be noted that the foregoing is only illustrative of the preferred embodiments of the present invention and the technical principles employed. It will be understood by those skilled in the art that the present invention is not limited to the particular embodiments described herein, but is capable of various obvious changes, rearrangements and substitutions as will now become apparent to those skilled in the art without departing from the scope of the invention. Therefore, although the present invention has been described in greater detail by the above embodiments, the present invention is not limited to the above embodiments, and may include other equivalent embodiments without departing from the spirit of the present invention, and the scope of the present invention is determined by the scope of the appended claims.

Claims (5)

1. An online detection method, comprising:
after logging in the system, acquiring equipment information bound with the system, and sending prompt information to corresponding equipment according to the equipment information, wherein the prompt information is used for prompting a user to carry the equipment with the user;
sending starting information to the equipment according to the equipment information so that the equipment can emit wireless signals according to the starting information;
according to the set angle and the preset frequency, periodically receiving a wireless signal carrying an equipment identifier in the set angle range, and shielding an infinite signal beyond the set angle, wherein a signal shielding device is arranged in the current terminal, and the set angle is set based on the environment where the current terminal is located;
if the equipment identification is matched with the equipment information, determining the distance between the equipment and the current terminal according to the strength of the wireless signal;
if the distance is greater than the safety distance, determining that the equipment is out of the safety range, logging out, and removing logging information;
if the equipment information bound with the system does not exist, determining at least one equipment to be bound according to the login information, sending the binding information to the equipment to be bound, and starting a second online detection mode when the feedback information is not received, wherein the second online detection mode comprises the steps of recording the operation state and the operation time of the input equipment of the current terminal, and if no input operation exists currently and the time from the last input operation is greater than a first time threshold value, logging out, and removing the login information.
2. The method of claim 1, after sending the startup information to the device according to the device information, further comprising:
if the wireless signal transmitted by the equipment is not received, determining at least one verification equipment according to the equipment information or login information, and sending verification information to the verification equipment;
and if the system is determined to be non-safe login according to the feedback information of the verification equipment, logging out, removing login information and sending alarm information to the verification equipment.
3. An on-line detection device, comprising:
the device information acquisition module is used for acquiring device information bound with the system after logging in the system and sending prompt information to corresponding devices according to the device information, wherein the prompt information is used for prompting a user to carry the device with the user;
the information sending module is used for sending starting information to the equipment according to the equipment information before periodically detecting whether the equipment is in a safety range according to the equipment information so as to enable the equipment to emit wireless signals according to the starting information;
the device detection module is used for periodically receiving wireless signals carrying device identification in a set angle range according to a set angle and a preset frequency and shielding wireless signals outside the set angle, wherein a signal shielding device is arranged in the current terminal, and the set angle is set based on the environment where the current terminal is located; if the equipment identification is matched with the equipment information, determining the distance between the equipment and the terminal according to the strength of the wireless signal, and if the distance is greater than a safe distance, determining that the equipment is out of a safe range;
the first logout module is used for logging out and clearing login information if the equipment is out of the safety range;
and the binding module is used for determining at least one device to be bound according to the login information if the device information bound with the system does not exist, sending the binding information to the device to be bound, and starting a second online detection mode when the feedback information is not received, wherein the second online detection mode comprises the steps of recording the operation state and the operation time of the input device of the current terminal, and logging out and clearing the login information if the current input operation does not exist and the time from the last input operation is greater than a first time threshold value.
4. A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the processor implements the online detection method according to any of claims 1-2 when executing the program.
5. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the online detection method according to any one of claims 1-2.
CN201711430478.8A 2017-12-26 2017-12-26 Online detection method and device, computer and storage medium Active CN108063767B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711430478.8A CN108063767B (en) 2017-12-26 2017-12-26 Online detection method and device, computer and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711430478.8A CN108063767B (en) 2017-12-26 2017-12-26 Online detection method and device, computer and storage medium

Publications (2)

Publication Number Publication Date
CN108063767A CN108063767A (en) 2018-05-22
CN108063767B true CN108063767B (en) 2021-07-27

Family

ID=62140287

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711430478.8A Active CN108063767B (en) 2017-12-26 2017-12-26 Online detection method and device, computer and storage medium

Country Status (1)

Country Link
CN (1) CN108063767B (en)

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104599130A (en) * 2013-12-23 2015-05-06 腾讯科技(深圳)有限公司 Payment verification method, device and system
CN103914645A (en) * 2014-04-03 2014-07-09 百度在线网络技术(北京)有限公司 Identity authentication method and wearing device
CN204216891U (en) * 2014-12-09 2015-03-18 上海罗盘信息科技有限公司 With the wireless terminal device of radome
CN106340087B (en) * 2015-07-16 2019-09-13 黄月平 Intelligent switch lock system based on intelligent mobile terminal
CN105430178A (en) * 2015-11-05 2016-03-23 上海斐讯数据通信技术有限公司 Wristband, mobile terminal and security information processing method and system thereof, and communication system

Also Published As

Publication number Publication date
CN108063767A (en) 2018-05-22

Similar Documents

Publication Publication Date Title
US9202029B2 (en) Computer device, a method for controlling a login status of a computer device and a server
US9549322B2 (en) Methods and systems for authentication of a communication device
US20090106835A1 (en) Method and apparatus for protecting sensitive information on a publicly accessed data processing system
CN110933103A (en) Anti-crawler method, device, equipment and medium
CN106255102B (en) Terminal equipment identification method and related equipment
CN113556167B (en) Data management method and device, electronic equipment and storage medium
KR20090038189A (en) Apparatus and method for managing terminal users
CN111866885A (en) Verification information sharing method and device and electronic equipment
US10528744B2 (en) Detecting security vulnerabilities on computing devices
CN112926059B (en) Data processing method, device, equipment and storage medium
CN106934607A (en) A kind of method of payment, payment system service end and payment devices
CN108737638A (en) Application control method, apparatus, mobile terminal and computer-readable medium
US10135798B2 (en) Systems and methods for implementing a proximity lock using bluetooth low energy
CN106209918A (en) The method of a kind of internet security management and terminal
CN106507300A (en) A kind of method for giving loss terminal for change, device and terminal
CN108763884B (en) Authority management method, device, mobile terminal and storage medium
CN106709330B (en) Method and device for recording file execution behaviors
CN108063767B (en) Online detection method and device, computer and storage medium
CN110968860A (en) Security verification method for application account, computer equipment and computer-readable storage medium
US10621332B2 (en) Computer system, IoT device monitoring method, and program
US20150066604A1 (en) Fare payment method and apparatus thereof
CN110856173B (en) Network access method and device and electronic equipment
US11321481B1 (en) Method for determining to grant or deny a permission request based on empirical data aggregation
CN108804122B (en) Information security processing system, virtual dedicated server, and control method thereof
CN107995150A (en) Auth method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant