CN110610071A - Privileged account management method and device based on screen identification - Google Patents
Privileged account management method and device based on screen identification Download PDFInfo
- Publication number
- CN110610071A CN110610071A CN201910770080.1A CN201910770080A CN110610071A CN 110610071 A CN110610071 A CN 110610071A CN 201910770080 A CN201910770080 A CN 201910770080A CN 110610071 A CN110610071 A CN 110610071A
- Authority
- CN
- China
- Prior art keywords
- password
- screen
- unit
- information
- image
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F18/00—Pattern recognition
- G06F18/20—Analysing
- G06F18/22—Matching criteria, e.g. proximity measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/451—Execution arrangements for user interfaces
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Data Mining & Analysis (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Human Computer Interaction (AREA)
- Life Sciences & Earth Sciences (AREA)
- Artificial Intelligence (AREA)
- Bioinformatics & Cheminformatics (AREA)
- Bioinformatics & Computational Biology (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Evolutionary Biology (AREA)
- Evolutionary Computation (AREA)
- Document Processing Apparatus (AREA)
Abstract
The invention discloses a method and a device for managing privileged accounts based on screen identification, wherein the method comprises the following steps: starting a browser or a client tool; intercepting a current screen image; carrying out feature extraction and information conversion; storing the image information after the information conversion; when the single sign-on process is carried out, calling a screen recognition module to carry out image information recognition and proofreading, and inputting a user name and a password in a user name and password input box; calling a screen identification module to identify a login button, and clicking the login button; judging whether the password information of the user is correct or not, if so, successfully logging in; judging whether the password needs to be modified, if so, calling a screen identification module, and clicking a password modification button according to password modification operation; then inputting a new password; click determination; and judging whether the password is successfully changed, if so, the new password conforms to the password policy and the password is successfully changed. The invention can realize the automatic single sign-on process and the encryption process, achieve the auditing effect and can be integrated with other tools to realize the management of the privileged account.
Description
Technical Field
The invention relates to the field of security management of privileged accounts, in particular to a method and a device for managing privileged accounts based on screen identification.
Background
The privileged account refers to an account with high risk (such as an administrator account capable of starting and stopping equipment) or an account with high value (such as an application account capable of reading service sensitive data), and the best protection method is to prevent a user from contacting a password and to periodically rotate the password, so that single sign-on is provided for the user, and safe and reliable audit is provided for the user. Traditional basic IT devices, such as servers, databases, etc., are relatively simple to implement for the management of privileged account passwords because these devices have a standard, sophisticated set of commands and protocols. However, a data center of an enterprise is not limited to these basic IT devices, and may also have some network devices, firewalls, or self-developed systems, and the privileged accounts of these devices and systems may be managed based on the Web, and some may be logged in based on tools, so that these privileged account management based on screen recognition is very challenging.
Disclosure of Invention
The technical problem to be solved by the present invention is to provide a method and an apparatus for managing privileged accounts based on screen identification, which can realize an automated single sign-on process and a password modification process, achieve an audit effect, and can integrate with other tools to realize management of privileged accounts, aiming at the above defects of the prior art.
The technical scheme adopted by the invention for solving the technical problems is as follows: a privileged account management method based on screen identification is constructed, and comprises the following steps:
A) starting a browser or a client tool;
B) intercepting a current screen image;
C) performing feature extraction and information conversion on the screen image;
D) storing the image information after information conversion, and executing the step E) or the step E');
E) when the single sign-on process is carried out, the screen identification module is called to carry out image information identification and proofreading, a user name and password input box is identified, and the user name and the password are input in the user name and password input box;
F) calling the screen identification module to identify a login button, and then clicking the login button;
G) judging whether the user password information is correct or not, if so, executing the step I); otherwise, executing step H);
H) withdrawing;
I) the login is successful, and the step J) is executed;
J) judging whether the password needs to be modified, if so, executing the step K); otherwise, returning to the step H);
K) calling the screen identification module, and clicking a password changing button according to password changing operation;
l) calling the screen identification module to identify a new password input box and then inputting a new password;
m) calling the screen identification module to identify a password changing determination button, and then clicking to determine;
n) judging whether the password modification is successful, if so, executing the step O); otherwise, returning to the step H);
o) the new password conforms to the password policy and the password change is successful;
e') when entering a log auditing process, carrying out image analysis and identification on the image information after information conversion;
f') checking and summarizing the image analysis and identification results, acquiring audit data of all image information, and forming auditable data;
g') arranging and outputting the auditable data as an audit report.
In the privilege account management method based on screen identification, the image information after information conversion is text information which can be processed by a computer.
In the privileged account management method based on screen identification of the present invention, in the step E), after the image information is successfully identified and collated, text input or mouse and keyboard operation can be performed.
The invention also relates to a device for realizing the privilege account management method based on screen identification, which comprises the following steps:
a starting unit: for launching a browser or client tool;
an image intercepting unit: the system is used for intercepting a current screen image;
an extraction and transformation unit: the system is used for carrying out feature extraction and information conversion on the screen image;
an information storage unit: the image processing device is used for storing the image information after the information conversion;
a password input unit: the system comprises a screen identification module, a user name and password input box, a password input box and a user name and password input box, wherein the screen identification module is used for identifying and checking image information, identifying the user name and password input box and inputting the user name and the password in the user name and password input box when a single sign-on process is carried out;
a login unit: the screen identification module is used for calling the screen identification module to identify a login button and then clicking the login button;
a password information determination unit: used for judging whether the user password information is correct or not;
an exit unit: for exiting;
a login success unit: for login success;
password modification judging unit: used for judging whether the password needs to be modified or not;
a secret modification unit: the screen identification module is used for calling, and clicking a password changing button according to password changing operation;
a new password input unit: the screen identification module is used for calling the screen identification module to identify a new password input box and then inputting a new password;
a secret modification determination unit: the password-changing determining button is used for calling the screen recognition module to recognize the password-changing determining button and then clicking to determine;
a successful encryption judgment unit: used for judging whether the password modification is successful;
a successful encryption unit: the new password accords with the password strategy and the password is successfully changed;
an image analysis and recognition unit: the log auditing system is used for carrying out image analysis and identification on the image information after information conversion when entering a log auditing process;
a checking and summarizing unit: the image analysis and identification device is used for verifying and summarizing image analysis and identification results, acquiring audit data of all image information and forming auditable data;
an audit report output unit: and the audit report is used for arranging and outputting the auditable data into an audit report.
In the device of the invention, the image information after the information conversion is text information which can be processed by a computer.
In the device of the invention, in the password input unit, after the image information is successfully identified and corrected, text input or mouse and keyboard operation can be carried out.
The privilege account management method and device based on screen identification have the following beneficial effects: the invention is applied to an automatic window-based application program, can use a screen object to access, and can be integrated with other tools to realize the management of privileged accounts, so that the invention can realize the automatic single sign-on process and the secret-changing process, and can realize the management of privileged accounts by being integrated with other tools.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
FIG. 1 is a flowchart of a method in one embodiment of a method and apparatus for screen-based identification of privileged accounts of the present invention;
FIG. 2 is a sub-flowchart illustrating the implementation of privileged account management by a screen recognition module in the embodiment;
fig. 3 is a schematic structural diagram of the device in the embodiment.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
In the embodiments of the privileged account management method and apparatus based on screen recognition, a flowchart of the privileged account management method based on screen recognition is shown in fig. 1. In fig. 1, the privileged account management method based on screen identification includes the following steps:
step S01 starts the browser or client tool: in this step, a browser or a client tool is started.
Step S02 intercepts the current screen image: in this step, the current screen image is captured.
Step S03 performs feature extraction and information conversion on the screen image: in this step, feature extraction and information conversion are performed on the screen image captured in step S02. The image information after information conversion can be text information which can be processed by a computer.
Step S04 stores the image information after information conversion: in this step, the image information after the information conversion is stored. After the present step is performed, step S05 or step S05' is performed.
Step S05, when performing the single sign-on process, performing image information identification and verification by calling the screen identification module, identifying the user name and password input box, and inputting the user name and password in the user name and password input box: in this step, when the single sign-on process is performed, the screen identification module is called to perform image information identification and proofreading, a user name and password input box is identified, and a corresponding user name and password are input in the user name and password input box. After the present step is executed, step S06 is executed.
Step S06 calls the screen recognition module to recognize the login button, and then clicks the login button: in this step, a screen recognition module is called to recognize the login button, and then the login button is clicked. After the present step is executed, step S07 is executed.
Step S07 determines whether the user password information is correct: in this step, it is determined whether the user password information is correct, and if the determination result is yes, step S09 is executed; otherwise, step S08 is executed.
Step S08 exits: in this step, the current flow is exited.
Step S09 login is successful: in this step, the user password information is correct and the login is successful. After the present step is executed, step S10 is executed.
Step S10 determines whether the password needs to be modified: in this step, it is determined whether the password needs to be modified, and if the determination result is yes, step S11 is executed; otherwise, i.e. the password is not to be modified, the procedure returns to step S08 and ends.
Step S11 calls a screen recognition module, and according to the password changing operation, clicks a password changing button: in the step, if the password is required to be changed, the screen identification module is called, and the password changing button is clicked according to the password changing operation. After the present step is executed, step S12 is executed.
Step S12 calls the screen recognition module to recognize the new password input box, and then inputs the new password: in this step, a screen recognition module is called to recognize the new password input box, and then a new password is input. After the present step is executed, step S13 is executed.
Step S13 calls the screen recognition module to recognize the password change determination button, and then clicks the determination: in this step, the screen recognition module is called to recognize the password change determination button, and then the determination is clicked. After the present step is executed, step S14 is executed.
Step S14 determines whether the password modification is successful: in this step, it is determined whether the password modification is successful, and if the determination result is yes, step S15 is executed; otherwise, the change of the encryption is failed, and the process returns to step S08.
Step S15 the new password complies with the password policy and the password change is successful: in this step, the new password conforms to the password policy and the password change is successful.
Step S05', when entering the log auditing process, performs image analysis and recognition on the image information after information conversion: in the step, when entering a log auditing process, image analysis and identification are carried out on the image information after information conversion. After the present step is performed, step S06' is performed.
Step S06', the image analysis and identification results are checked and summarized to obtain audit data of all image information, and auditable data are formed: in the step, the image analysis and identification results are checked and summarized, audit data of all image information is obtained, and auditable data is formed. After the present step is performed, step S07' is performed.
Step S07' arranges auditable data and outputs the auditable data as an audit report: in this step, auditable data is collated and output as an audit report.
The privilege account management method based on screen recognition adopts the screen recognition module to extract the characteristics of the screen captured image, adopts the powerful visual matching function to carry out automatic matching and information proofreading, then controls a GUI component to input text or other operations to complete an automatic single sign-on process and a secret-changing process, and can also be used for summarizing to form unstructured audit data based on the image analysis recognition result to achieve an audit effect. The privilege account management method based on screen identification is applied to automatic window-based application programs, such as automatic Flash objects or Flash websites, and can be accessed by using the screen objects, so that the privilege account management method can be integrated with other tools to realize privilege account management.
Fig. 2 is a schematic view of a sub-process of implementing privileged account management by using a screen recognition module in this embodiment. In fig. 2, step a is: intercepting a current screen and collecting image information; the step B is as follows: the image information is converted into text information which can be processed by a computer; the step C is as follows: identifying and correcting the current screen and the image information; the step D is as follows: after the proofreading and matching are successful, text input or mouse and keyboard operation is carried out; the step E is as follows: completing single sign-on or password-changing process; the step F is as follows: summarizing the image information to form auditable data; the step G is as follows: and outputting an audit report.
The embodiment also relates to a device for implementing the privileged account management method based on screen identification, and a structural schematic diagram of the device is shown in fig. 3. In fig. 3, the device includes a starting unit 1, an image intercepting unit 2, an extraction and conversion unit 3, an information storage unit 4, a password input unit 5, a login unit 6, a password information judgment unit 7, an exit unit 8, a login success unit 9, a password modification judgment unit 10, a password modification unit 11, a new password input unit 12, a password modification determination unit 13, a password modification success judgment unit 14, a password modification success unit 15, an image analysis and identification unit 16, a verification and summary unit 17, and an audit report output unit 18.
The starting unit 1 is used for starting a browser or a client tool; the image intercepting unit 2 is used for intercepting a current screen image; the extraction and conversion unit 3 is used for carrying out feature extraction and information conversion on the screen image; the information storage unit 4 is used for storing the image information after the information conversion, and the image information after the information conversion is text information which can be processed by a computer.
The password input unit 5 is used for identifying and checking image information by calling the screen identification module when a single sign-on process is carried out, identifying a user name and a password input box, and inputting the user name and the password in the user name and password input box, and in the password input unit 5, after the image information is successfully identified and checked, text input or mouse and keyboard operation can be carried out.
The login unit 6 is used for calling a screen identification module to identify a login button and then clicking the login button; the password information judging unit 7 is used for judging whether the password information of the user is correct or not; the exit unit 8 is used for exiting; the login success unit 9 is used for successful login; the password modification judging unit 10 is used for judging whether the password needs to be modified; the encryption unit 11 is used for calling a screen identification module and clicking an encryption button according to encryption operation; the new password input unit 12 is used for calling a screen identification module to identify a new password input box and then inputting a new password; the password changing determining unit 13 is used for calling a screen recognition module to recognize a password changing determining button and then clicking to determine; the encryption success judging unit 14 is used for judging whether the encryption is successful; the encryption success unit 15 is used for the new password to accord with the password policy and the encryption is successful; the image analysis and identification unit 16 is used for performing image analysis and identification on the image information after information conversion when entering a log audit process; the verification and summarization unit 17 is used for verifying and summarizing the image analysis and identification results, acquiring audit data of all image information and forming auditable data; the audit report output unit 18 is used for arranging and outputting auditable data into an audit report.
The device adopts the screen recognition module to extract the characteristics of the screen captured image, adopts the powerful visual matching function to carry out automatic matching and information proofreading, then controls the GUI component to input text or other operations to complete an automatic single sign-on process and a secret-changing process, and can gather the result based on the image analysis recognition to form unstructured audit data to achieve an audit effect. The device provided by the invention is applied to an automatic window-based application program, such as an automatic Flash object or a Flash website, and can be accessed by using the screen object, so that the device can be integrated with other tools to realize the management of privileged account numbers.
In summary, in this embodiment, the screen recognition module is used to perform feature extraction on the screen captured image, perform automatic matching and information proofreading by using a powerful "visual matching" function, and then control the GUI component to input text or other operations to complete an automatic single sign-on process and a password-changing process, and in addition, the GUI component can also perform summarization based on the result of image analysis recognition to form a piece of unstructured audit data, so as to achieve an audit effect.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents, improvements and the like that fall within the spirit and principle of the present invention are intended to be included therein.
Claims (6)
1. A privilege account management method based on screen identification is characterized by comprising the following steps:
A) starting a browser or a client tool;
B) intercepting a current screen image;
C) performing feature extraction and information conversion on the screen image;
D) storing the image information after information conversion, and executing the step E) or the step E');
E) when the single sign-on process is carried out, the screen identification module is called to carry out image information identification and proofreading, a user name and password input box is identified, and the user name and the password are input in the user name and password input box;
F) calling the screen identification module to identify a login button, and then clicking the login button;
G) judging whether the user password information is correct or not, if so, executing the step I); otherwise, executing step H);
H) withdrawing;
I) the login is successful, and the step J) is executed;
J) judging whether the password needs to be modified, if so, executing the step K); otherwise, returning to the step H);
K) calling the screen identification module, and clicking a password changing button according to password changing operation;
l) calling the screen identification module to identify a new password input box and then inputting a new password;
m) calling the screen identification module to identify a password changing determination button, and then clicking to determine;
n) judging whether the password modification is successful, if so, executing the step O); otherwise, returning to the step H);
o) the new password conforms to the password policy and the password change is successful;
e') when entering a log auditing process, carrying out image analysis and identification on the image information after information conversion;
f') checking and summarizing the image analysis and identification results, acquiring audit data of all image information, and forming auditable data;
g') arranging and outputting the auditable data as an audit report.
2. The privileged account management method based on screen recognition of claim 1, wherein the image information after information conversion is text information that can be processed by a computer.
3. The privileged account management method based on the screen recognition of the claim 1 or 2, wherein in the step E), when the image information recognition and correction is successful, text input or mouse and keyboard operation can be performed.
4. An apparatus for implementing the privileged account management method based on screen recognition according to claim 1, comprising:
a starting unit: for launching a browser or client tool;
an image intercepting unit: the system is used for intercepting a current screen image;
an extraction and transformation unit: the system is used for carrying out feature extraction and information conversion on the screen image;
an information storage unit: the image processing device is used for storing the image information after the information conversion;
a password input unit: the system comprises a screen identification module, a user name and password input box, a password input box and a user name and password input box, wherein the screen identification module is used for identifying and checking image information, identifying the user name and password input box and inputting the user name and the password in the user name and password input box when a single sign-on process is carried out;
a login unit: the screen identification module is used for calling the screen identification module to identify a login button and then clicking the login button;
a password information determination unit: used for judging whether the user password information is correct or not;
an exit unit: for exiting;
a login success unit: for login success;
password modification judging unit: used for judging whether the password needs to be modified or not;
a secret modification unit: the screen identification module is used for calling, and clicking a password changing button according to password changing operation;
a new password input unit: the screen identification module is used for calling the screen identification module to identify a new password input box and then inputting a new password;
a secret modification determination unit: the password-changing determining button is used for calling the screen recognition module to recognize the password-changing determining button and then clicking to determine;
a successful encryption judgment unit: used for judging whether the password modification is successful;
a successful encryption unit: the new password accords with the password strategy and the password is successfully changed;
an image analysis and recognition unit: the log auditing system is used for carrying out image analysis and identification on the image information after information conversion when entering a log auditing process;
a checking and summarizing unit: the image analysis and identification device is used for verifying and summarizing image analysis and identification results, acquiring audit data of all image information and forming auditable data;
an audit report output unit: and the audit report is used for arranging and outputting the auditable data into an audit report.
5. The apparatus according to claim 4, wherein the image information after the information conversion is text information which can be processed by a computer.
6. The apparatus according to claim 4 or 5, wherein in the password input unit, when the image information is successfully identified and collated, text input or mouse and keyboard operation is enabled.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910770080.1A CN110610071A (en) | 2019-08-20 | 2019-08-20 | Privileged account management method and device based on screen identification |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910770080.1A CN110610071A (en) | 2019-08-20 | 2019-08-20 | Privileged account management method and device based on screen identification |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110610071A true CN110610071A (en) | 2019-12-24 |
Family
ID=68889998
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910770080.1A Pending CN110610071A (en) | 2019-08-20 | 2019-08-20 | Privileged account management method and device based on screen identification |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110610071A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111460356A (en) * | 2020-04-23 | 2020-07-28 | 北京信安世纪科技股份有限公司 | Automatic login method, device, medium and equipment |
CN114969464A (en) * | 2021-10-15 | 2022-08-30 | 淮阴师范学院 | Intelligent visual display system based on millimeter wave communication |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103795732A (en) * | 2014-02-27 | 2014-05-14 | 北京金山网络科技有限公司 | Method and device for generating code |
US20150205777A1 (en) * | 2014-01-23 | 2015-07-23 | Xerox Corporation | Automated form fill-in via form retrieval |
CN104883353A (en) * | 2015-03-31 | 2015-09-02 | 深圳市深信服电子科技有限公司 | Terminal single sign-on configuration and authentication method and system, and application service system |
CN106161710A (en) * | 2015-04-24 | 2016-11-23 | 合肥高维数据技术有限公司 | A kind of user account safety management system based on smart mobile phone |
CN107040535A (en) * | 2017-04-07 | 2017-08-11 | 网易(杭州)网络有限公司 | Mobile solution channel logs in monitoring method, device, system and storage medium |
CN107395613A (en) * | 2017-08-09 | 2017-11-24 | 上海织语网络科技有限公司 | A kind of self-adapted service system single-sign-on accessory system and single-point logging method |
-
2019
- 2019-08-20 CN CN201910770080.1A patent/CN110610071A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150205777A1 (en) * | 2014-01-23 | 2015-07-23 | Xerox Corporation | Automated form fill-in via form retrieval |
CN103795732A (en) * | 2014-02-27 | 2014-05-14 | 北京金山网络科技有限公司 | Method and device for generating code |
CN104883353A (en) * | 2015-03-31 | 2015-09-02 | 深圳市深信服电子科技有限公司 | Terminal single sign-on configuration and authentication method and system, and application service system |
CN106161710A (en) * | 2015-04-24 | 2016-11-23 | 合肥高维数据技术有限公司 | A kind of user account safety management system based on smart mobile phone |
CN107040535A (en) * | 2017-04-07 | 2017-08-11 | 网易(杭州)网络有限公司 | Mobile solution channel logs in monitoring method, device, system and storage medium |
CN107395613A (en) * | 2017-08-09 | 2017-11-24 | 上海织语网络科技有限公司 | A kind of self-adapted service system single-sign-on accessory system and single-point logging method |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111460356A (en) * | 2020-04-23 | 2020-07-28 | 北京信安世纪科技股份有限公司 | Automatic login method, device, medium and equipment |
CN111460356B (en) * | 2020-04-23 | 2024-03-12 | 北京信安世纪科技股份有限公司 | Automatic login method, device, medium and equipment |
CN114969464A (en) * | 2021-10-15 | 2022-08-30 | 淮阴师范学院 | Intelligent visual display system based on millimeter wave communication |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10242173B2 (en) | OCR-based single sign-on | |
US9824196B2 (en) | Authenticating users requesting access to computing resources | |
US9628357B2 (en) | Service compliance enforcement using user activity monitoring and work request verification | |
US10721245B2 (en) | Method and device for automatically verifying security event | |
US8959586B2 (en) | Enterprise biometric authentication system | |
US9069943B2 (en) | Method and apparatus for token-based tamper detection | |
US8539558B2 (en) | Method and apparatus for token-based token termination | |
US20130047266A1 (en) | Method and apparatus for token-based access of related resources | |
US20140007208A1 (en) | Interactive Authentication | |
CN109753783B (en) | Single sign-on method and device based on machine learning and computer readable storage medium | |
US10389710B2 (en) | Method and system for extracting characteristic information | |
JP6438534B2 (en) | System and method for performing secure online banking transactions | |
US10362055B2 (en) | System and methods for active brute force attack protection | |
CN111092910A (en) | Database security access method, device, equipment, system and readable storage medium | |
CN110610071A (en) | Privileged account management method and device based on screen identification | |
CN106817342A (en) | Active identity authorization system based on user behavior feature recognition | |
US9531725B2 (en) | Optimizing infrastructure support based on authenticated access, validation and context related information retrieval | |
CN110113346B (en) | Network verification method, user terminal and server | |
US20200267137A1 (en) | Systems and methods for smart contract-based detection of authentication attacks | |
WO2021103701A1 (en) | Transaction risk identification method and apparatus | |
CN112398787B (en) | Mailbox login verification method and device, computer equipment and storage medium | |
KR102435307B1 (en) | Account management method and device using authentication by vaccine program | |
KR101944696B1 (en) | Method for auto login base on biometric data, and computer readable recording medium applying the same | |
CN113938312B (en) | Method and device for detecting violent cracking flow | |
US11568054B2 (en) | Web application login macro generation and verification |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20191224 |
|
RJ01 | Rejection of invention patent application after publication |