CN109002705A - process authentication method, device and server - Google Patents

process authentication method, device and server Download PDF

Info

Publication number
CN109002705A
CN109002705A CN201810638291.5A CN201810638291A CN109002705A CN 109002705 A CN109002705 A CN 109002705A CN 201810638291 A CN201810638291 A CN 201810638291A CN 109002705 A CN109002705 A CN 109002705A
Authority
CN
China
Prior art keywords
certified
authentication
authentication processes
result
cryptographic hash
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810638291.5A
Other languages
Chinese (zh)
Other versions
CN109002705B (en
Inventor
黄悦
胡小鹏
胡昌威
李婧
周晨
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Keda Technology Co Ltd
Original Assignee
Suzhou Keda Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suzhou Keda Technology Co Ltd filed Critical Suzhou Keda Technology Co Ltd
Priority to CN201810638291.5A priority Critical patent/CN109002705B/en
Publication of CN109002705A publication Critical patent/CN109002705A/en
Application granted granted Critical
Publication of CN109002705B publication Critical patent/CN109002705B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • G06F21/445Program or device authentication by mutual authentication, e.g. between devices or programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of process authentication method, device and servers, and wherein method comprises determining that the process to be certified newly started;By at least two authentication processes the safety of the process to be certified is authenticated respectively, when solving Server master controller and being attacked, the problem of security of system difference.

Description

Process authentication method, device and server
Technical field
The present invention relates to interprocess communication security technology areas, and in particular to a kind of process authentication method, device and service Device.
Background technique
With popularizing for video communication technology, more and more users use real-time video communication, and consequent is view The safety issue of frequency communication process.In order to ensure the safety of video communication process, safeguard technology stresses at this stage Point focuses mostly in transmission network and the communications field, rarely has the Security Assurance Mechanism inside concern videoconference system server.
In the prior art, for the Security Assurance Mechanism of server internal, the unified protection certification of master controller is taken The mode of information, in this case, after master controller is attacked, it is understood that there may be detached from master controller and even make use of main control Device creates the case where malicious process is stolen or forges user data, and the network interface that can use system transfers data to it He is local.To sum up, after master controller is attacked, the Security Assurance Mechanism of network transmission and the communications field just loses effect, Entire video conferencing system will be in unsafe state, not can guarantee the safety of video communication.
Summary of the invention
In view of this, the embodiment of the invention provides a kind of process authentication method, device and servers, with settlement server When master controller is attacked, the problem of security of system difference.
According in a first aspect, the embodiment of the invention provides a kind of process authentication method, including determine newly start wait recognize Card process;By at least two authentication processes the safety of the process to be certified is authenticated respectively.
With reference to first aspect, in first aspect first embodiment, by least two authentication processes respectively to institute State process to be certified safety carry out certification include: by described at least two authentication processes respectively to it is described it is to be certified into For the certification of Cheng Jinhang first to obtain at least two intermediate authentication results, the intermediate authentication result includes reliable result and insincere As a result;Count the accounting of reliable result described in the intermediate authentication result;When the accounting of the reliable result is more than default When threshold value, the process safety to be certified is determined.
First embodiment with reference to first aspect, it is described to pass through described at least two in first aspect second embodiment A authentication processes carry out the first certification to the process to be certified respectively to obtain at least two intermediate authentication results, comprising: By described at least two authentication processes Hash operation is carried out to the process identification (PID) of the process to be certified respectively, obtain first Cryptographic Hash;By at least two authentication processes be utilized respectively number of the public spoon to the process to be certified of the process to be certified Word signature is decrypted, and obtains the second cryptographic Hash;It is respectively compared described in first cryptographic Hash and second cryptographic Hash acquisition Intermediate authentication result.
Second embodiment with reference to first aspect, it is described to be respectively compared described in first aspect third embodiment One cryptographic Hash and second cryptographic Hash obtain the intermediate authentication result, comprising: when first cryptographic Hash and described second When cryptographic Hash is identical, determine that the intermediate authentication result is reliable result;Or when first cryptographic Hash and described second are breathed out It is uncommon value it is not identical when, determine the intermediate authentication result be insincere result.
Second embodiment with reference to first aspect, in the 4th embodiment of first aspect, the institute of the process to be certified Stating digital signature is the process to be certified to process identification (PID) progress Hash operation, obtains the number of the process to be certified Word abstract, and the digital digest is encrypted to obtain according to the private spoon of the process to be certified.
With reference to first aspect, first aspect first embodiment is to the 4th embodiment of first aspect, in first aspect In five embodiments, described at least two authentication processes be distributed at least two chips of server chips group.
Second embodiment with reference to first aspect, in first aspect sixth embodiment, using described in the progress of MD4 algorithm Hash operation.
With reference to first aspect, in the 7th embodiment of first aspect, by least two authentication processes distinguish It, will be described to be certified when determining that the process to be certified is safe after being authenticated to the safety of the process to be certified The process identification (PID) of process is appended in the list of authentication processes.
According to second aspect, the embodiment of the invention provides a kind of process authentication devices, comprising: determining module, for true The fixed process to be certified newly started;Authentication module, for by least two authentication processes respectively to the process to be certified Safety authenticated.
According to the third aspect, the embodiment of the invention provides a kind of server, at least two are stored in the server Authentication processes, described at least two authentication processes the safety of the process to be certified newly started is authenticated respectively.
In embodiments of the present invention, pass through the process to be certified of acquisition request security credential;Recognize by least two The mode that card process respectively authenticates the safety of the process to be certified, when treating authentication processes and being authenticated, by At least two processes carry out respectively, according to the authentication result of at least two processes, finally determine the side of process safety to be certified Method, when solving Server master controller and being attacked, the problem of security of system difference has reached the technology for improving security of system Effect.
Detailed description of the invention
The features and advantages of the present invention will be more clearly understood by referring to the accompanying drawings, and attached drawing is schematically without that should manage Solution is carries out any restrictions to the present invention, in the accompanying drawings:
Fig. 1 shows a kind of flow chart of optional process authentication method according to embodiments of the present invention;
Fig. 2 shows according to embodiments of the present invention under a kind of optional application scenarios process authentication method flow chart;
Fig. 3 shows a kind of optional Inter-Process Communication structure according to embodiments of the present invention;
Fig. 4 shows a kind of schematic diagram of optional process authentication device according to embodiments of the present invention.
Specific embodiment
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with the embodiment of the present invention In attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is A part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, those skilled in the art are not having Every other embodiment obtained under the premise of creative work is made, shall fall within the protection scope of the present invention.
Embodiment one
The embodiment of the invention provides a kind of process authentication method, Fig. 1 shows a kind of optional according to embodiments of the present invention Process authentication method flow chart, as shown in Figure 1, this method comprises:
Step S11 determines the process to be certified newly started.
Specifically, process to be certified can be the process of newest starting, and the starting of process to be certified can be derived from user Relevant operation, be also possible to derived from the malicious process that is implanted.
It should be noted that in embodiments of the present invention, can be the process to be certified by newly starting to the certification of process Request safety certification.That is, upon power-up of the system, application program, that is, corresponding initialization data is removed from solid-state memory It moves on in running memory, start monitoring information and treats the function that authentication processes are authenticated.
Step S12, by least two authentication processes the safety of the process to be certified is authenticated respectively.
Specifically, the quantity of authentication processes can be two and can be multiple, and authentication processes can be in server The initialization process of storage, can be and be solidificated in the hardware of server internal, and the starting of the process can be at server bottom Layer drives after powering on and completes.Treat authentication processes carry out security credential during, at least two authentication processes distinguish Independent authentication processes for the treatment of carry out security credential.
In embodiments of the present invention, by the authentication processes of at least two in server, authentication processes are treated respectively The mode for carrying out security credential, overcomes under the mode that master controller uniformly protects authentication information, is attacked in master controller When hitting, can not carry out security credential to malicious process leads to the problem of security of system difference, effective preventing malice process logarithm According to steal and forge, reached improve server processes certification safety technical effect.
In a kind of optional embodiment of the present invention, step S12 may include:
Step S121, by described at least two authentication processes respectively to the process to be certified carry out the first certification with At least two intermediate authentication results are obtained, the intermediate authentication result includes reliable result and insincere result.
Specifically, after the certification request that authentication processes receive the process to be certified newly started, by least two Each of authentication processes, independently when treating authentication processes and carrying out the first certification, each authentication processes An intermediate authentication result is obtained, i.e. each the available reliable result of authentication processes or an insincere knot Fruit.
Step S122 counts the accounting of reliable result described in the intermediate authentication result.
Step S123 determines the process safety to be certified when the accounting of the reliable result is more than preset threshold.
Specifically, preset threshold can be preset numerical value, such as 50%, that is to say, that authenticate among statistics When as a result, when the accounting of reliable result is more than 50%, process safety to be certified is determined;When the accounting of insincere result is more than When 50%, determine that process to be certified is dangerous.That is, carrying out first in the safety that authentication processes treat authentication processes After certification, authentication result is broadcast to other authentication processes, and the intermediate of authentication processes has authenticated knot while listening for other The broadcast of fruit.Its method counted can be, and count all intermediate authentication results, when the accounting of reliable result is more than preset threshold When, determine process safety to be certified.Similarly, when insincere result is more than preset threshold, determine that process to be certified is dangerous.Its The method of statistics is also possible to stop statistics when counting reliable result accounting more than preset threshold, directly give to be certified The result of process safety.Similarly, when counting insincere result accounting more than preset threshold, stop statistics, directly give to The unsafe result of authentication processes.
It should be noted that authenticating knot among statistics for each authentication processes obtain intermediate authentication result In fruit when the accounting of reliable result, its identical or different weighted value can be assigned.
In a kind of optional embodiment of the present invention, step S121, by described at least two authentication processes distinguish Carrying out the first certification to the process to be certified to obtain at least two intermediate authentication results may include:
By described at least two each of authentication processes respectively to the process identification (PID) of the process to be certified into Row Hash operation obtains the first cryptographic Hash;
By described at least two authentication processes be utilized respectively the public spoon of the process to be certified to it is described it is to be certified into The digital signature of journey is decrypted, and obtains the second cryptographic Hash;
It is respectively compared first cryptographic Hash and second cryptographic Hash obtains the intermediate authentication result.
Specifically, in the request safety certification of the process to be certified newly started, the process identification (PID) of itself, number are signed Name and public spoon are broadcasted to each authentication processes, each authentication processes according to receive process identification (PID), number label Name and public spoon are treated authentication processes respectively and are authenticated.Each is right when authentication processes are treated authentication processes and authenticated Process identification (PID) carries out Hash operation can be using MD4 algorithm, MD5 algorithm or SHS algorithm etc..
It should be noted that the digital signature of process to be certified can be breathing out to its process identification (PID) for process to be certified Uncommon operation, obtains the digital digest of process to be certified, and encrypted to obtain to digital digest according to the private spoon of process to be certified.
It should also be noted that, in embodiments of the present invention, in verification process, being added by private spoon and public spoon It is close, it is ensured that verification process has credible, uniqueness, avoids information from being forged, improves the confidence level of certification.
In a kind of optional embodiment of the present invention, it is respectively compared first cryptographic Hash and second cryptographic Hash obtains Obtaining the intermediate authentication result may include:
When first cryptographic Hash is identical as second cryptographic Hash, determine that the intermediate authentication result is credible knot Fruit;Or when first cryptographic Hash and second cryptographic Hash be not identical, determine that the intermediate authentication result is insincere As a result.
In a kind of optional embodiment of the present invention, the Hash operation can be carried out using MD4 algorithm.With other Kazakhstan The algorithm that uncommon operation uses is compared, and the bit that MD4 algorithm occupies is less, arithmetic speed faster, to the occupancy ratio of real resource It is smaller.Also, by MD4 algorithm carry out Hash operation when, Hash collide a possibility that it is lower.
In a kind of optional embodiment of the present invention, by least two each of authentication processes it is right respectively After the safety of the process to be certified is authenticated, the method also includes:
When determining that the process to be certified is safe, the process identification (PID) of the process to be certified is appended to authentication processes List in.
Specifically, after determining process safety to be certified, the process identification (PID) of process to be certified can be appended to and has been recognized In the list of card process, that is to say, that security credential can be carried out to other processes to be certified by the process.
It should be noted that then the process can be related to the foundation of the whole network process after determining process safety to be certified Communication, it is on the contrary then data can not be obtained from any process.
Optionally, in any one of the above embodiment, at least two authentication processes be distributed in server new chip On at least two chips of group.
Specifically, server may include one or more chipset, any one chipset is made of multiple chips, At least two authentication processes be distributed at least two chips of chipset.Wherein, the quantity of authentication processes can basis Actual conditions are set, and the quantity of authentication processes is more, and the distribution on chip more disperses, and the safety of system is got over It is high.For example, when at least running an authentication processes on each chip of server chips group, a certain process or certain When several processes are under attack, it can guarantee the safety of system to greatest extent.
Below by concrete application scene, process authentication method is provided to the embodiment of the present invention and is illustrated, such as Fig. 2 institute Show, this method may include:
Step S1 starts initialization process;
Necessary initialization operation is completed, application program and corresponding initialization data are moved from solid-state memory to fortune In row memory.
Step S2, starting monitoring information and the function of authenticating other processes;
Fig. 3 shows a kind of optional Inter-Process Communication structure according to embodiments of the present invention.
Step S3 receives the certification message of the request safety certification of process to be certified;
Certification message includes process identification (PID), digital signature and the public spoon information of process to be certified.
Step S4 treats the process identification (PID) of authentication processes by least two authentication processes, and MD4 algorithm is utilized to carry out Hash operation obtains the first cryptographic Hash;
The process to be certified newly started carries out Hash operation by the process identification (PID) of itself, by MD4 algorithm, and operation result is Digital digest encrypts digital digest using private spoon, obtains digital signature.
Step S5 treats the number of authentication processes using the public spoon of process to be certified by least two authentication processes Signature is decrypted, and obtains the second cryptographic Hash.
Step S6 judges whether the first cryptographic Hash is identical as the second cryptographic Hash;
Step S7 determines that the intermediate authentication result of process to be certified is when the first cryptographic Hash is identical as the second cryptographic Hash Reliable result;
Step S8 determines the intermediate authentication result of process to be certified when the first cryptographic Hash and the second cryptographic Hash be not identical For insincere result;
Step S9, the whole network broadcast intermediate authentication result;
After authentication processes obtain the intermediate authentication result of process to be certified, which is broadcast to other Authentication processes, and while listening for the broadcast of other intermediate authentication results of authentication processes.
Step S10 counts the accounting of reliable result at least two intermediate authentication results;
Whether step S11 judges the accounting of reliable result more than 50%;
Step S12 determines process safety to be certified when the accounting of reliable result is more than 50%;
Step S13 determines that process to be certified is dangerous when the credible accounting recorded a demerit is less than or equal to 50%;
Step S14, when process to be certified is safe, process to be certified establishes relevant communication to the whole network.
In embodiments of the present invention, by the authentication processes of at least two in server, authentication processes are treated respectively The mode for carrying out security credential, overcomes under the mode that master controller uniformly protects authentication information, is attacked in master controller When hitting, can not carry out security credential to malicious process leads to the problem of security of system difference, effective preventing malice process logarithm According to steal and forge, reached improve server processes certification safety technical effect.
Embodiment two
Fig. 4 shows a kind of schematic diagram of optional process authentication device according to embodiments of the present invention, as shown in figure 4, should Device includes:
Determining module 41, for determining the process to be certified newly started;It refers in embodiment one, the description of step S11.
Authentication module 42, for by least two authentication processes the safety of the process to be certified is carried out respectively Certification.It refers in embodiment one, the description of step S12.
In embodiments of the present invention, recognized by obtaining module 41 for the process to be certified of acquisition request security credential Demonstrate,prove module 42, for by least two each of authentication processes the safety of the process to be certified is carried out respectively The mode of certification overcomes under the mode that master controller uniformly protects authentication information, when master controller is attacked, safety The problem of difference has reached the technical effect for improving the safety of server processes certification.
In a kind of optional embodiment of the present invention, authentication module 42 may include:
Authentication unit, for by described at least two authentication processes first carried out to the process to be certified respectively recognize For card to obtain at least two intermediate authentication results, the intermediate authentication result includes reliable result and insincere result;It refers to In embodiment one, the description of step S121.
Statistic unit, for counting the accounting of reliable result described in the intermediate authentication result;Refer to embodiment one In, the description of step S122.
Determination unit, for determining the process to be certified when the accounting of the reliable result is more than preset threshold Safety.It refers in embodiment one, the description of step S123.
Embodiment three
A kind of server is additionally provided according to embodiments of the present invention, and at least two authentication processes are stored in server, Described at least two authentication processes the safety of the process to be certified newly started is authenticated respectively.
It is that can lead to it will be understood by those skilled in the art that realizing all or part of the process in above-described embodiment method Computer program is crossed to instruct relevant hardware and complete, the program can be stored in a computer-readable storage medium In, the program is when being executed, it may include such as the process of the embodiment of above-mentioned each method.Wherein, the storage medium can for magnetic disk, CD, read-only memory (Read-Only Memory, ROM), random access memory (Random Access Memory, RAM), flash memory (Flash Memory), hard disk (Hard Disk Drive, abbreviation: HDD) or solid state hard disk (Solid-State Drive, SSD) etc.;The storage medium can also include the combination of the memory of mentioned kind.
Although being described in conjunction with the accompanying the embodiment of the present invention, those skilled in the art can not depart from the present invention Spirit and scope in the case where various modifications and variations can be made, such modifications and variations are each fallen within by appended claims institute Within the scope of restriction.

Claims (10)

1. a kind of process authentication method characterized by comprising
Determine the process to be certified newly started;
By at least two authentication processes the safety of the process to be certified is authenticated respectively.
2. the method according to claim 1, wherein by least two authentication processes respectively to described wait recognize The safety of card process carries out certification
By described at least two authentication processes the first certification is carried out to obtain at least two to the process to be certified respectively Intermediate authentication result, the intermediate authentication result include reliable result and insincere result;
Count the accounting of reliable result described in the intermediate authentication result;
When the accounting of the reliable result is more than preset threshold, the process safety to be certified is determined.
3. according to the method described in claim 2, it is characterized in that, it is described by described at least two authentication processes it is right respectively The process to be certified carries out the first certification to obtain at least two intermediate authentication results, comprising:
By described at least two authentication processes Hash operation is carried out to the process identification (PID) of the process to be certified respectively, obtain First cryptographic Hash;
By described at least two authentication processes be utilized respectively the public spoon of the process to be certified to the process to be certified Digital signature is decrypted, and obtains the second cryptographic Hash;
It is respectively compared first cryptographic Hash and second cryptographic Hash obtains the intermediate authentication result.
4. according to the method described in claim 3, it is characterized in that, described be respectively compared first cryptographic Hash and described second Cryptographic Hash obtains the intermediate authentication result, comprising:
When first cryptographic Hash is identical as second cryptographic Hash, determine that the intermediate authentication result is reliable result;Or Person
When first cryptographic Hash and second cryptographic Hash be not identical, determine that the intermediate authentication result is insincere knot Fruit.
5. according to the method described in claim 3, it is characterized in that, the digital signature of the process to be certified be it is described to Authentication processes carry out Hash operation to the process identification (PID), obtain the digital digest of the process to be certified, and according to described The private spoon of process to be certified is encrypted to obtain to the digital digest.
6. method according to any one of claims 1-5, which is characterized in that described at least two authentication processes distributions In at least two chips of server chips group.
7. according to the method described in claim 3, it is characterized in that, carrying out the Hash operation using MD4 algorithm.
8. the method according to claim 1, wherein by least two authentication processes respectively to it is described to After the safety of authentication processes is authenticated, the method also includes:
When determining that the process to be certified is safe, the process identification (PID) of the process to be certified is appended to the column of authentication processes In table.
9. a kind of process authentication device characterized by comprising
Determining module, for determining the process to be certified newly started;
Authentication module, for by least two authentication processes the safety of the process to be certified is authenticated respectively.
10. a kind of server, which is characterized in that it is stored at least two authentication processes in the server, described at least two The safety of the process to be certified newly started is authenticated respectively in a authentication processes.
CN201810638291.5A 2018-06-20 2018-06-20 Process authentication method and device and server Active CN109002705B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810638291.5A CN109002705B (en) 2018-06-20 2018-06-20 Process authentication method and device and server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810638291.5A CN109002705B (en) 2018-06-20 2018-06-20 Process authentication method and device and server

Publications (2)

Publication Number Publication Date
CN109002705A true CN109002705A (en) 2018-12-14
CN109002705B CN109002705B (en) 2021-07-06

Family

ID=64601225

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810638291.5A Active CN109002705B (en) 2018-06-20 2018-06-20 Process authentication method and device and server

Country Status (1)

Country Link
CN (1) CN109002705B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3674938A3 (en) * 2020-01-13 2020-09-16 CyberArk Software Ltd. Identifying computing processes on automation servers

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102223242A (en) * 2010-04-15 2011-10-19 腾讯数码(天津)有限公司 Method and system for verifying authenticity of group members in SNS (social networking service) community
CN102646173A (en) * 2012-02-29 2012-08-22 成都新云软件有限公司 Safety protection control method and system based on white and black lists
CN103235914A (en) * 2013-04-27 2013-08-07 上海海事大学 Cloud malice detection engine identification method
CN103955438A (en) * 2014-05-21 2014-07-30 南京大学 Process memory protecting method based on auxiliary virtualization technology for hardware
CN104158816A (en) * 2014-08-25 2014-11-19 中国科学院声学研究所 Authentication method and device as well as server
CN104461830B (en) * 2014-12-19 2017-09-22 北京奇虎科技有限公司 The method and apparatus of monitoring process

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102223242A (en) * 2010-04-15 2011-10-19 腾讯数码(天津)有限公司 Method and system for verifying authenticity of group members in SNS (social networking service) community
CN102646173A (en) * 2012-02-29 2012-08-22 成都新云软件有限公司 Safety protection control method and system based on white and black lists
CN103235914A (en) * 2013-04-27 2013-08-07 上海海事大学 Cloud malice detection engine identification method
CN103955438A (en) * 2014-05-21 2014-07-30 南京大学 Process memory protecting method based on auxiliary virtualization technology for hardware
CN104158816A (en) * 2014-08-25 2014-11-19 中国科学院声学研究所 Authentication method and device as well as server
CN104461830B (en) * 2014-12-19 2017-09-22 北京奇虎科技有限公司 The method and apparatus of monitoring process

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3674938A3 (en) * 2020-01-13 2020-09-16 CyberArk Software Ltd. Identifying computing processes on automation servers
US10812272B1 (en) 2020-01-13 2020-10-20 Cyberark Software Ltd. Identifying computing processes on automation servers

Also Published As

Publication number Publication date
CN109002705B (en) 2021-07-06

Similar Documents

Publication Publication Date Title
US20210295327A1 (en) Unique transaction identifier, which may also include a time expiration value, is assigned by a first network website to an electronic instruction to collect specified distinctive identifiers from a local/mobile computing device seeking access to said first network website
US8091120B2 (en) Adaptive authentication methods, systems, devices, and computer program products
US10110585B2 (en) Multi-party authentication in a zero-trust distributed system
CN115189927B (en) Zero trust-based power network safety protection method
CN108964885B (en) Authentication method, device, system and storage medium
EP2875460B1 (en) Anti-cloning system and method
US20140189807A1 (en) Methods, systems and apparatus to facilitate client-based authentication
KR20180026508A (en) A security verification method based on biometric characteristics, a client terminal, and a server
CN105827573B (en) System, method and the relevant apparatus of internet of things equipment strong authentication
US20160182491A1 (en) Methods, systems and apparatus to manage an authentication sequence
WO2016076913A1 (en) Conditional login promotion
CN110830446B (en) SPA security verification method and device
US8504824B1 (en) One-time rotating key for third-party authentication
CN114513786A (en) 5G feeder automation access control method, device and medium based on zero trust
CN113992354A (en) Identity authentication method, device, equipment and machine readable storage medium
CN109002705A (en) process authentication method, device and server
US20210067961A1 (en) Secure simultaneous authentication of equals anti-clogging mechanism
Alemu et al. Fingerprint based authentication architecture for accessing multiple cloud computing services using single user credential in IOT environments
US11177958B2 (en) Protection of authentication tokens
CN115460015A (en) TOTP-based identity authentication method and system for Web application
CN114024682A (en) Cross-domain single sign-on method, service equipment and authentication equipment
CN109617898B (en) Remote authentication method, device, equipment and storage medium thereof
WO2021156746A1 (en) A method, a system and a biometric server for controlling access of users to desktops in an organization
US8726340B2 (en) Apparatus and method for expert decisioning
US20110107394A1 (en) Authentication methods and devices

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant