CN110930234A - Financial management method with remote access function - Google Patents

Financial management method with remote access function Download PDF

Info

Publication number
CN110930234A
CN110930234A CN201911128829.9A CN201911128829A CN110930234A CN 110930234 A CN110930234 A CN 110930234A CN 201911128829 A CN201911128829 A CN 201911128829A CN 110930234 A CN110930234 A CN 110930234A
Authority
CN
China
Prior art keywords
user
identity
access
verification code
file
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201911128829.9A
Other languages
Chinese (zh)
Other versions
CN110930234B (en
Inventor
杜晨琳
田夏晓
付志霞
董亚琼
郭伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Henan University of Urban Construction
Original Assignee
Henan University of Urban Construction
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Henan University of Urban Construction filed Critical Henan University of Urban Construction
Priority to CN201911128829.9A priority Critical patent/CN110930234B/en
Publication of CN110930234A publication Critical patent/CN110930234A/en
Application granted granted Critical
Publication of CN110930234B publication Critical patent/CN110930234B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/12Accounting
    • G06Q40/125Finance or payroll
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/54Interprogram communication
    • G06F9/547Remote procedure calls [RPC]; Web services
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Abstract

The invention discloses a financial management method with a remote access function, which comprises the following steps: s1: dividing the identity grades of computer intranet connection users of an enterprise, and simultaneously determining the identity grade users which can be connected by the user of each identity grade; s2: the method comprises the steps that a computer intranet of an enterprise is configured, so that a user can identify the identity of the user before accessing the computer intranet, and the identity grade of the currently accessed user is determined according to the identity of the user; s3: displaying the user with the identity grade which can be accessed by the user to the user, opening a port of the user which can be accessed, allowing the user to select to access, and providing the access of the user; s4: monitoring the operation of the user, and when the user checks the financial statement, performing authority access on the user; s5: and after the user passes the access right, executing the step S4, and when the user does not pass the access right, cutting off the port of the currently accessed user to ensure the data security of the financial statement.

Description

Financial management method with remote access function
Technical Field
The invention relates to the technical field of financial management, in particular to a financial management method with a remote access function.
Background
Financial management is the management of the purchase of assets, the financing of capital, the cash flow in business, and the allocation of profits with a certain overall objective. Accounting is a very important role in financial management, and plays an important role in financial management.
Generally speaking, financial statements in an enterprise are confidential for each enterprise, accounting is kept in a special file system, and any person cannot view the financial statements at will, which has sufficient security, but when a manager of the enterprise wants to view the financial statements, the financial statements are inconvenient to view and need to be viewed on a computer set inside the enterprise, so that a great trouble is caused to some urgent events.
Disclosure of Invention
The invention aims to overcome the problems in the prior art and provide a financial management method with a remote access function, which shields the user permission through the configuration of a computer network and verifies the user permission in real time when checking the financial statement data to ensure the data security of the financial statement.
Therefore, the invention provides a financial management method with a remote access function, which comprises the following steps:
s1: dividing the identity grades of computer intranet connection users of an enterprise, and simultaneously determining the identity grade users which can be connected by the user of each identity grade;
s2: the method comprises the steps that a computer intranet of an enterprise is configured, so that a user can identify the identity of the user before accessing the computer intranet, and the identity grade of the currently accessed user is determined according to the identity of the user;
s3: displaying the user with the identity grade which can be accessed by the user to the user, opening a port of the user which can be accessed, allowing the user to select to access, and providing the access of the user;
s4: monitoring the operation of the user, and when the user checks the financial statement, performing authority access on the user;
s5: after the user passes the right access, step S4 is executed, and when the user does not pass the right access, the port of the currently accessed user is cut off.
Further, in step S4, the method includes the steps of:
s4-1: monitoring the operation of the accessed user through a monitor, and acquiring a file to be acquired by the operation of the user in real time;
s4-2: extracting a file to be acquired by the operation of a user to obtain the type of the file to be acquired by the operation of the user;
s4-3: and when the type of the file to be acquired by the operation of the user is the financial statement, performing access of the authority on the user.
Further, in step S4-2, first converting the file into a format of a text document, extracting keywords in the format of the text document, and finally finding a type corresponding to the keywords in a type database as the type of the file to be obtained by the user; the type database is used for storing the keywords and the types corresponding to the keywords.
Further, in step S4-3, the access to the user right is first authenticated to the user by dynamic authentication, and then the user identity is confirmed by testing.
Furthermore, the method for authenticating the user through the dynamic authentication comprises the following steps:
s4-3-1.1: generating a verification code, encrypting the verification code through an encryption algorithm to obtain verification information, and finally sending the verification information to a mobile phone corresponding to a user;
s4-3-1.2: receiving verification information input by a user, and decoding the verification information input by the user through an inverse encryption algorithm to obtain an inverse verification code;
s4-3-1.3: and comparing the anti-verification code with the verification code, if the anti-verification code is consistent with the verification code, judging that the verification is successful, and if the anti-verification code is inconsistent with the verification code, judging that the verification is failed.
Further, the identity of the user is confirmed through testing, and the method comprises the following steps:
s4-3-2.1: randomly selecting a set number of questions from a question bank, and sequentially displaying the questions to a user;
s4-3-2.2: receiving the answer of the user, and comparing the answer of the user with the standard answer of the question to judge whether the answer is wrong;
s4-3-2.3: counting the number of the questions which are wrongly answered by the user and comparing the number of the questions which are wrongly answered by the user with the set error number, if the number of the questions is larger than the set error number, determining that the user answers wrongly, and otherwise, determining that the user answers correctly.
The financial management method with the remote access function provided by the invention has the following beneficial effects:
1. the user permission is shielded through the configuration of a computer network, and meanwhile, the permission of the user is verified in real time when the financial statement data is checked, so that the data security of the financial statement is ensured;
2. the access authority of the user is determined according to the identity level of the user, so that the safety of data can be preliminarily ensured in the authority;
3. the type of the file is acquired, the user is selectively monitored, and the user is subjected to authority access when the user browses the financial statement, so that the working frequency of the server can be saved;
4. the identity of the user is identified and judged through the verification code and the test, so that the identity of the user is judged more accurately, and the data safety of the financial statement is further guaranteed.
Drawings
FIG. 1 is a schematic overall flow chart of a financial management method with remote access function according to the present invention;
FIG. 2 is a schematic overall flowchart of step S4 of a financial management method with remote access function according to the present invention;
FIG. 3 is a schematic overall flowchart illustrating the process of authenticating a user through dynamic authentication in step S4-3 of the financial management method with remote access function according to the present invention;
fig. 4 is a schematic overall flowchart of the financial management method with remote access function according to the present invention, wherein the identity of the user is confirmed through a test in step S4-3.
Detailed Description
Several embodiments of the present invention will be described in detail below with reference to the drawings, but it should be understood that the scope of the present invention is not limited to the embodiments.
In the present application, the type and structure of components that are not specified are all the prior art known to those skilled in the art, and those skilled in the art can set the components according to the needs of the actual situation, and the embodiments of the present application are not specifically limited.
Example 1
The embodiment provides a financial management method with a remote access function, which is realized by basic necessary technical characteristics so as to solve the problems brought forward by the technical background part in the application document.
Specifically, as shown in fig. 1, an embodiment of the present invention provides a financial management method with a remote access function, including the following steps:
s1: dividing the identity grades of computer intranet connection users of an enterprise, and simultaneously determining the identity grade users which can be connected by the user of each identity grade;
for example, for the users at the financial chief level, the users at all employee levels of the financial part can be connected, while the employee level can not be connected with the users at any level, and the users to which the specific user level can be connected are set by the skilled person according to the requirements of each company.
S2: the method comprises the steps that a computer intranet of an enterprise is configured, so that a user can identify the identity of the user before accessing the computer intranet, and the identity grade of the currently accessed user is determined according to the identity of the user;
when a user lightly accesses an intranet, a server firstly checks an IP subnet mask of the user requesting access, identifies the identity of the user according to the IP subnet mask of the user, then determines the registration of the user according to the identity of the user, and sets the identity of the user and the IP subnet mask of the user through an administrator user of the server.
S3: displaying the user with the identity grade which can be accessed by the user to the user, opening a port of the user which can be accessed, allowing the user to select to access, and providing the access of the user;
and displaying the users which can be accessed and connected by the users to the user requesting the access in a list form or other display forms through the display port, and opening the user selected by the user requesting the access after the user requesting the access selects.
S4: monitoring the operation of the user, and when the user checks the financial statement, performing authority access on the user;
when the user accesses, the operation of the user is monitored, and when the user checks the financial statement, the user is subjected to authority access.
S5: after the user passes the right access, step S4 is executed, and when the user does not pass the right access, the port of the currently accessed user is cut off.
After the user passes the authority access, the operation can be continuously carried out in the accessed user, the user is still in a monitored state, and when the user does not pass the authority access, the port of the currently accessed user is cut off, so that the user is disconnected, and if the user needs to be connected again, the request needs to be proposed again.
Example 2
The present embodiment is based on example 1 and optimizes the implementation scheme in example 1, so that the present embodiment is more stable and better in performance during the operation process, but the present embodiment is not limited to the implementation manner described in the present embodiment.
Specifically, step S4 includes the following steps:
s4-1: monitoring the operation of the accessed user through a monitor, and acquiring a file to be acquired by the operation of the user in real time;
the server monitors the user's operation through a built-in monitor, and when the user selects a file, the server acquires information of the file from the accessed user.
S4-2: extracting a file to be acquired by the operation of a user to obtain the type of the file to be acquired by the operation of the user;
the server extracts the acquired file, namely extracting a suffix name of the file, converting the format of the file according to the suffix name of the file, finally extracting a keyword of the file from the converted file, and obtaining the type of the file according to the keyword.
S4-3: and when the type of the file to be acquired by the operation of the user is the financial statement, performing access of the authority on the user.
The server judges the file according to the file type in the step S4-2, and when the type of the file to be acquired by the user operation is the financial statement, the server performs access of the authority to the user.
In this embodiment, in step S4-2, first converting the file into a format of a text document, extracting a keyword in the format of the text document, and finally finding a type corresponding to the keyword in a type database as a type of the file to be obtained by the user operation; the type database is used for storing the keywords and the types corresponding to the keywords.
In this embodiment, in step S4-3, the access to the user right is first authenticated to the user by dynamic authentication, and then the identity of the user is confirmed by testing.
Therefore, through dual authentication, the judgment on the identity of the user is more accurate, and the safety of financial data is ensured.
In this embodiment, first, the authentication is performed on the user through dynamic authentication, which includes the following steps:
s4-3-1.1: generating a verification code, encrypting the verification code through an encryption algorithm to obtain verification information, and finally sending the verification information to a mobile phone corresponding to a user;
s4-3-1.2: receiving verification information input by a user, and decoding the verification information input by the user through an inverse encryption algorithm to obtain an inverse verification code;
s4-3-1.3: and comparing the anti-verification code with the verification code, if the anti-verification code is consistent with the verification code, judging that the verification is successful, and if the anti-verification code is inconsistent with the verification code, judging that the verification is failed.
According to the method, the verification code is prevented from being stolen and lost by encrypting the data, and meanwhile, in the embodiment, the encryption algorithm corresponds to the anti-encryption algorithm and the anti-encryption algorithm are mutually inverse.
Then, the identity of the user is confirmed through testing, and the method comprises the following steps:
s4-3-2.1: randomly selecting a set number of questions from a question bank, and sequentially displaying the questions to a user;
s4-3-2.2: receiving the answer of the user, and comparing the answer of the user with the standard answer of the question to judge whether the answer is wrong;
s4-3-2.3: counting the number of the questions which are wrongly answered by the user and comparing the number of the questions which are wrongly answered by the user with the set error number, if the number of the questions is larger than the set error number, determining that the user answers wrongly, and otherwise, determining that the user answers correctly.
In the technical scheme, the identity of the user is verified in a question-and-answer mode, so that the identity of the user is more accurate when being determined.
Firstly, the identity accuracy of the user can be judged through dynamic identity verification, then the identity of the user is confirmed through testing, and the identity of the user is further determined, so that the identity of the user is determined more accurately.
In summary, the present invention discloses a financial management method with remote access function, which includes the following steps: s1: dividing the identity grades of computer intranet connection users of an enterprise, and simultaneously determining the identity grade users which can be connected by the user of each identity grade; s2: the method comprises the steps that a computer intranet of an enterprise is configured, so that a user can identify the identity of the user before accessing the computer intranet, and the identity grade of the currently accessed user is determined according to the identity of the user; s3: displaying the user with the identity grade which can be accessed by the user to the user, opening a port of the user which can be accessed, allowing the user to select to access, and providing the access of the user; s4: monitoring the operation of the user, and when the user checks the financial statement, performing authority access on the user; s5: after the user passes the right access, step S4 is executed, and when the user does not pass the right access, the port of the currently accessed user is cut off. The invention shields the user authority through the configuration of the computer network, and simultaneously verifies the authority of the user in real time when checking the data of the financial statement, thereby ensuring the data security of the financial statement.
The above disclosure is only for a few specific embodiments of the present invention, however, the present invention is not limited to the above embodiments, and any variations that can be made by those skilled in the art are intended to fall within the scope of the present invention.

Claims (6)

1. A financial management method with remote access, comprising the steps of:
s1: dividing the identity grades of computer intranet connection users of an enterprise, and simultaneously determining the identity grade users which can be connected by the user of each identity grade;
s2: the method comprises the steps that a computer intranet of an enterprise is configured, so that a user can identify the identity of the user before accessing the computer intranet, and the identity grade of the currently accessed user is determined according to the identity of the user;
s3: displaying the user with the identity grade which can be accessed by the user to the user, opening a port of the user which can be accessed, allowing the user to select to access, and providing the access of the user;
s4: monitoring the operation of the user, and when the user checks the financial statement, performing authority access on the user;
s5: after the user passes the right access, step S4 is executed, and when the user does not pass the right access, the port of the currently accessed user is cut off.
2. A financial management method with remote access function according to claim 1, which includes the following steps in step S4:
s4-1: monitoring the operation of the accessed user through a monitor, and acquiring a file to be acquired by the operation of the user in real time;
s4-2: extracting a file to be acquired by the operation of a user to obtain the type of the file to be acquired by the operation of the user;
s4-3: and when the type of the file to be acquired by the operation of the user is the financial statement, performing access of the authority on the user.
3. The financial management method according to claim 2 wherein, in step S4-2, the file is first converted into a text document format, keywords in the text document format are extracted, and finally the type corresponding to the keywords is found in the type database as the type of the file to be obtained by the user operation; the type database is used for storing the keywords and the types corresponding to the keywords.
4. A financial management method with remote access function according to claim 2 wherein in step S4-3, said access to the user 'S authority is authenticated to the user first by dynamic authentication and then the user' S identity is confirmed by test.
5. A financial management method with remote access as claimed in claim 4, wherein the user is authenticated by dynamic authentication, comprising the steps of:
s4-3-1.1: generating a verification code, encrypting the verification code through an encryption algorithm to obtain verification information, and finally sending the verification information to a mobile phone corresponding to a user;
s4-3-1.2: receiving verification information input by a user, and decoding the verification information input by the user through an inverse encryption algorithm to obtain an inverse verification code;
s4-3-1.3: and comparing the anti-verification code with the verification code, if the anti-verification code is consistent with the verification code, judging that the verification is successful, and if the anti-verification code is inconsistent with the verification code, judging that the verification is failed.
6. A financial management method with remote access as in claim 4 wherein the user's identity is confirmed by a test comprising the steps of:
s4-3-2.1: randomly selecting a set number of questions from a question bank, and sequentially displaying the questions to a user;
s4-3-2.2: receiving the answer of the user, and comparing the answer of the user with the standard answer of the question to judge whether the answer is wrong;
s4-3-2.3: counting the number of the questions which are wrongly answered by the user and comparing the number of the questions which are wrongly answered by the user with the set error number, if the number of the questions is larger than the set error number, determining that the user answers wrongly, and otherwise, determining that the user answers correctly.
CN201911128829.9A 2019-11-18 2019-11-18 Financial management method with remote access function Active CN110930234B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911128829.9A CN110930234B (en) 2019-11-18 2019-11-18 Financial management method with remote access function

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911128829.9A CN110930234B (en) 2019-11-18 2019-11-18 Financial management method with remote access function

Publications (2)

Publication Number Publication Date
CN110930234A true CN110930234A (en) 2020-03-27
CN110930234B CN110930234B (en) 2024-03-12

Family

ID=69854158

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911128829.9A Active CN110930234B (en) 2019-11-18 2019-11-18 Financial management method with remote access function

Country Status (1)

Country Link
CN (1) CN110930234B (en)

Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030046591A1 (en) * 2001-08-29 2003-03-06 Nader Asghari-Kamrani Centralized identification and authentication system and method
CN105450672A (en) * 2016-01-05 2016-03-30 上海大之商科技发展股份有限公司 Internal network secure transmission method and system of financial data
CN105704095A (en) * 2014-11-26 2016-06-22 阿里巴巴集团控股有限公司 Identity authentication method and identity authentication device
US20160342992A1 (en) * 2014-01-13 2016-11-24 Patricia Lee System and method for financial management
CN106209903A (en) * 2016-08-03 2016-12-07 苏州浩悦商业管理有限公司 A kind of remote access financial system with encryption device
CN106685912A (en) * 2016-08-09 2017-05-17 厦门天锐科技股份有限公司 Secure access method of application system
CN107315963A (en) * 2017-06-06 2017-11-03 太仓鸿策腾达网络科技有限公司 A kind of financial management method with remote access function
CN107770191A (en) * 2017-11-03 2018-03-06 黑龙江工业学院 A kind of finicial administration of enterprise system with security protection
CN108040046A (en) * 2017-12-07 2018-05-15 中国银行股份有限公司 Data access control method and device
CN108288224A (en) * 2018-04-16 2018-07-17 洛阳师范学院 A kind of finicial administration of enterprise system
CN108897997A (en) * 2018-06-25 2018-11-27 武汉凡果信息技术股份有限公司 A kind of financial security system and its management method
CN109818935A (en) * 2018-05-04 2019-05-28 360企业安全技术(珠海)有限公司 User authority control method and device, storage medium, computer equipment
CN110245475A (en) * 2019-05-30 2019-09-17 阿里巴巴集团控股有限公司 Auth method and device
CN110287660A (en) * 2019-05-21 2019-09-27 深圳壹账通智能科技有限公司 Access right control method, device, equipment and storage medium
CN110288315A (en) * 2019-06-18 2019-09-27 浙江无极互联科技有限公司 A kind of financial management computer system

Patent Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030046591A1 (en) * 2001-08-29 2003-03-06 Nader Asghari-Kamrani Centralized identification and authentication system and method
US20160342992A1 (en) * 2014-01-13 2016-11-24 Patricia Lee System and method for financial management
CN105704095A (en) * 2014-11-26 2016-06-22 阿里巴巴集团控股有限公司 Identity authentication method and identity authentication device
CN105450672A (en) * 2016-01-05 2016-03-30 上海大之商科技发展股份有限公司 Internal network secure transmission method and system of financial data
CN106209903A (en) * 2016-08-03 2016-12-07 苏州浩悦商业管理有限公司 A kind of remote access financial system with encryption device
CN106685912A (en) * 2016-08-09 2017-05-17 厦门天锐科技股份有限公司 Secure access method of application system
CN107315963A (en) * 2017-06-06 2017-11-03 太仓鸿策腾达网络科技有限公司 A kind of financial management method with remote access function
CN107770191A (en) * 2017-11-03 2018-03-06 黑龙江工业学院 A kind of finicial administration of enterprise system with security protection
CN108040046A (en) * 2017-12-07 2018-05-15 中国银行股份有限公司 Data access control method and device
CN108288224A (en) * 2018-04-16 2018-07-17 洛阳师范学院 A kind of finicial administration of enterprise system
CN109818935A (en) * 2018-05-04 2019-05-28 360企业安全技术(珠海)有限公司 User authority control method and device, storage medium, computer equipment
CN108897997A (en) * 2018-06-25 2018-11-27 武汉凡果信息技术股份有限公司 A kind of financial security system and its management method
CN110287660A (en) * 2019-05-21 2019-09-27 深圳壹账通智能科技有限公司 Access right control method, device, equipment and storage medium
CN110245475A (en) * 2019-05-30 2019-09-17 阿里巴巴集团控股有限公司 Auth method and device
CN110288315A (en) * 2019-06-18 2019-09-27 浙江无极互联科技有限公司 A kind of financial management computer system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
钟建平;: "高校财务信息化建设中VPN技术的应用", 会计之友(上旬刊), no. 05 *

Also Published As

Publication number Publication date
CN110930234B (en) 2024-03-12

Similar Documents

Publication Publication Date Title
US11190527B2 (en) Identity verification and login methods, apparatuses, and computer devices
US9338161B2 (en) System and method for biometric protocol standards
US6532459B1 (en) System for finding, identifying, tracking, and correcting personal information in diverse databases
US20210136073A1 (en) Identity authentication method, personal security kernel node, device, and medium
CN109039987A (en) A kind of user account login method, device, electronic equipment and storage medium
US20130298186A1 (en) System and Method for Policy Based Privileged User Access Management
CN107517180B (en) Login method and device
CN104836777B (en) Identity verification method and system
CN110086813A (en) Access right control method and device
CN113326488A (en) Personal information protection system and method
CN112287326A (en) Security authentication method and device, electronic equipment and storage medium
US20090046708A1 (en) Methods And Systems For Transmitting A Data Attribute From An Authenticated System
CN108040090A (en) A kind of system combination method of more Web
CN112838951B (en) Operation and maintenance method, device and system of terminal equipment and storage medium
CN110535652A (en) A kind of system and method by each operation system data integration displaying and unified login
CN114268461A (en) User identity authentication method, device, server, terminal and storage medium
CN109274699A (en) Method for authenticating, device, server and storage medium
US7987513B2 (en) Data-use restricting method and computer product
CN109214189B (en) Method, device, storage medium and electronic equipment for identifying program bugs
CN114257451B (en) Verification interface replacement method and device, storage medium and computer equipment
CN106888200A (en) Mark correlating method, method for sending information and device
CN110930234B (en) Financial management method with remote access function
CN115879156A (en) Dynamic desensitization method, device, electronic equipment and storage medium
KR20050010430A (en) A method of authenticating users by using one time password and a system thereof
CN112765588A (en) Identity recognition method and device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant