CN110930234B - Financial management method with remote access function - Google Patents

Financial management method with remote access function Download PDF

Info

Publication number
CN110930234B
CN110930234B CN201911128829.9A CN201911128829A CN110930234B CN 110930234 B CN110930234 B CN 110930234B CN 201911128829 A CN201911128829 A CN 201911128829A CN 110930234 B CN110930234 B CN 110930234B
Authority
CN
China
Prior art keywords
user
identity
access
verification
file
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911128829.9A
Other languages
Chinese (zh)
Other versions
CN110930234A (en
Inventor
杜晨琳
田夏晓
付志霞
董亚琼
郭伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Henan University of Urban Construction
Original Assignee
Henan University of Urban Construction
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Henan University of Urban Construction filed Critical Henan University of Urban Construction
Priority to CN201911128829.9A priority Critical patent/CN110930234B/en
Publication of CN110930234A publication Critical patent/CN110930234A/en
Application granted granted Critical
Publication of CN110930234B publication Critical patent/CN110930234B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/12Accounting
    • G06Q40/125Finance or payroll
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/54Interprogram communication
    • G06F9/547Remote procedure calls [RPC]; Web services
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Abstract

The invention discloses a financial management method with a remote access function, which comprises the following steps: s1: dividing the identity grades of the connected users in the computer intranet of the enterprise, and simultaneously determining the users of each identity grade which can be connected with the user of each identity grade; s2: the method comprises the steps that through configuration of a computer intranet of an enterprise, a user is enabled to identify the identity of the user before accessing the computer intranet, and the identity grade of the currently accessed user is determined according to the identity of the user; s3: displaying the user with the identity grade which can be accessed by the user to the user, opening the port of the user which can be accessed, allowing the user to select to access, and providing the access of the user; s4: monitoring the operation of the user, and accessing the authority of the user when the user views the financial statement; s5: and when the user does not pass the authority access, cutting off the port of the currently accessed user, and ensuring the data security of the financial statement.

Description

Financial management method with remote access function
Technical Field
The invention relates to the technical field of financial management, in particular to a financial management method with a remote access function.
Background
Financial management is the management of purchases of assets, financing of capital, cash flow in business, and profit sharing with certain overall objectives. Accounting is a very important role in financial management, which plays an important role.
Generally, financial reports in enterprises are confidential of each enterprise, accounting is stored in a special file system, any person cannot check at will, and the financial reports are inconvenient to check when an administrator of the enterprise checks the financial reports, and the financial reports need to be checked on computers set in the enterprises, so that emergency events are greatly plagued.
Disclosure of Invention
The invention aims to overcome the problems in the prior art and provide a financial management method with a remote access function, wherein the user permission is shielded through the configuration of a computer network, and simultaneously, the permission of the user is verified in real time when the financial statement data is checked, so that the data security of the financial statement is ensured.
To this end, the present invention provides a financial management method with a remote access function, comprising the steps of:
s1: dividing the identity grades of the connected users in the computer intranet of the enterprise, and simultaneously determining the users of each identity grade which can be connected with the user of each identity grade;
s2: the method comprises the steps that through configuration of a computer intranet of an enterprise, a user is enabled to identify the identity of the user before accessing the computer intranet, and the identity grade of the currently accessed user is determined according to the identity of the user;
s3: displaying the user with the identity grade which can be accessed by the user to the user, opening the port of the user which can be accessed, allowing the user to select to access, and providing the access of the user;
s4: monitoring the operation of the user, and accessing the authority of the user when the user views the financial statement;
s5: after the user passes the authority access, step S4 is executed, and when the user does not pass the authority access, the port of the currently accessed user is cut off.
Further, in step S4, the steps of:
s4-1: monitoring the operation of the accessed user through a monitor, and acquiring a file to be acquired by the operation of the user in real time;
s4-2: extracting a file to be acquired by the operation of a user to obtain the type of the file to be acquired by the operation of the user;
s4-3: and when the type of the file to be acquired by the operation of the user is the financial statement, accessing the authority of the user.
Further, in step S4-2, firstly, the file is converted into a text document format, the keywords in the text document format are extracted, and finally, the type corresponding to the keywords is found in the type database according to the keywords to be used as the type of the file to be acquired by the operation of the user; the type database is used for storing keywords and types corresponding to the keywords.
Further, in step S4-3, the access to the rights of the user is performed, firstly, by dynamic authentication, and then, by testing, the identity of the user is confirmed.
Further, the authentication is performed to the user through dynamic authentication, comprising the following steps:
s4-3-1.1: generating a verification code, encrypting the verification code through an encryption algorithm to obtain verification information, and finally transmitting the verification information to a corresponding mobile phone of a user;
s4-3-1.2: receiving verification information input by a user, and decoding the verification information input by the user through an anti-encryption algorithm to obtain an anti-verification code;
s4-3-1.3: comparing the anti-verification code with the verification code, if the anti-verification code is consistent with the verification code, the verification is successful, and if the anti-verification code is inconsistent with the verification code, the verification is failed.
Further, the identity of the user is confirmed by testing, comprising the following steps:
s4-3-2.1: randomly selecting a set number of questions from a question bank, and sequentially displaying the questions to a user;
s4-3-2.2: receiving the answer of the user, and comparing the answer of the user with the standard answer of the question to judge errors;
s4-3-2.3: counting the number of questions with wrong answers by the user, comparing the number of questions with wrong answers by the user with the set number of errors, and if the number of questions with wrong answers by the user is larger than the set number of errors, judging that the answer of the user is wrong, otherwise, judging that the answer of the user is correct.
The financial management method with the remote access function has the following beneficial effects:
1. the user authority is shielded through the configuration of a computer network, and meanwhile, when the financial statement data is checked, the authority of the user is verified in real time, so that the data safety of the financial statement is ensured;
2. determining the access authority of the user according to the identity level of the user, so that the security of the data can be preliminarily ensured in terms of authority;
3. the user is selectively monitored by acquiring the types of the files, and authority access is carried out on the user when the user browses the financial statement, so that the working frequency of the server can be saved;
4. the identity of the user is identified and judged through the verification code and the test, so that the identity judgment of the user is more accurate, and the data safety of the financial statement is further ensured.
Drawings
FIG. 1 is a schematic diagram of an overall flow of a financial management method with remote access function provided by the present invention;
FIG. 2 is a schematic overall flow chart of step S4 of a financial management method with remote access function according to the present invention;
FIG. 3 is a schematic diagram of the overall process of authentication of a user through dynamic authentication in step S4-3 of a financial management method with remote access function provided by the present invention;
FIG. 4 is a schematic diagram of the overall flow of confirming the identity of a user through testing in step S4-3 of a financial management method with remote access function provided by the present invention.
Detailed Description
The following detailed description of various embodiments of the invention is, however, understood to be within the scope of the invention and not limited to the embodiments.
In this application, the model and structure of the components are not explicitly known in the prior art, and can be set by those skilled in the art according to the needs of the actual situation, and the embodiments of this application are not specifically limited.
Example 1
The present embodiment provides a financial management method with a remote access function, and the present invention is implemented through basic essential technical features, so as to solve the problems set forth in the technical background section in this application document.
Specifically, as shown in fig. 1, an embodiment of the present invention provides a financial management method with a remote access function, including the following steps:
s1: dividing the identity grades of the connected users in the computer intranet of the enterprise, and simultaneously determining the users of each identity grade which can be connected with the user of each identity grade;
for example, for a user at the financial director level, users at all employee levels of the financial sector may be connected, while employee levels may not be connected to users at any level, and users to which a particular user level may be connected, as would be required by the individual company, may be set by those skilled in the art.
S2: the method comprises the steps that through configuration of a computer intranet of an enterprise, a user is enabled to identify the identity of the user before accessing the computer intranet, and the identity grade of the currently accessed user is determined according to the identity of the user;
when the user accesses the intranet lightly, the server firstly checks the IP subnet mask of the user requesting access, identifies the identity of the user according to the IP subnet mask of the user, then determines the registration of the user according to the identity of the user, and sets the identity of the user and the IP subnet mask of the user through the administrator user of the server.
S3: displaying the user with the identity grade which can be accessed by the user to the user, opening the port of the user which can be accessed, allowing the user to select to access, and providing the access of the user;
and displaying the users which can be accessed to the parallel connection by the users to the users requesting access in a list form or other display forms through the display ports, and opening the users selected by the users requesting access after the users requesting access select.
S4: monitoring the operation of the user, and accessing the authority of the user when the user views the financial statement;
when the user accesses, the operation of the user is monitored, and when the user views the financial statement, the user is authorized to access.
S5: after the user passes the authority access, step S4 is executed, and when the user does not pass the authority access, the port of the currently accessed user is cut off.
After the user passes the authority access, the operation can be continued in the accessed user, the user is still in a monitored state, and when the user does not pass the authority access, the port of the currently accessed user is cut off, so that the users are disconnected, and if the users need to be connected again, the request needs to be re-sent.
Example 2
This example is based on example 1 and the implementation in example 1 is optimized to make this example more stable and perform better during operation, but is not limited to only one implementation described in this example.
Specifically, in step S4, the method includes the following steps:
s4-1: monitoring the operation of the accessed user through a monitor, and acquiring a file to be acquired by the operation of the user in real time;
the server monitors the user's operation through a built-in monitor, and when the user selects a file, the server acquires information of the file from the accessed user.
S4-2: extracting a file to be acquired by the operation of a user to obtain the type of the file to be acquired by the operation of the user;
the server extracts the obtained file, namely, extracts the suffix name of the file, converts the format of the file according to the suffix name of the file, finally extracts the keywords of the file from the converted file, and obtains the type of the file according to the keywords.
S4-3: and when the type of the file to be acquired by the operation of the user is the financial statement, accessing the authority of the user.
And the server judges the file according to the file type in the step S4-2, and when the type of the file to be obtained by the operation of the user is a financial statement, the server accesses the authority of the user.
In this embodiment, in step S4-2, firstly, a file is converted into a text document format, keywords in the text document format are extracted, and finally, a type corresponding to the keywords is found in a type database according to the keywords, and is used as a type of the file to be acquired by the operation of the user; the type database is used for storing keywords and types corresponding to the keywords.
In this embodiment, in step S4-3, the access to the rights of the user is performed, firstly, by dynamic authentication, to authenticate the user, and then, by testing, the identity of the user is confirmed.
Thus, the identity verification is performed in a double mode, so that the judgment of the identity of the user is more accurate, and the safety of the financial data is ensured.
In this embodiment, first, authentication is performed to a user through dynamic authentication, including the following steps:
s4-3-1.1: generating a verification code, encrypting the verification code through an encryption algorithm to obtain verification information, and finally transmitting the verification information to a corresponding mobile phone of a user;
s4-3-1.2: receiving verification information input by a user, and decoding the verification information input by the user through an anti-encryption algorithm to obtain an anti-verification code;
s4-3-1.3: comparing the anti-verification code with the verification code, if the anti-verification code is consistent with the verification code, the verification is successful, and if the anti-verification code is inconsistent with the verification code, the verification is failed.
In the method, the verification code is prevented from being stolen by encrypting the data, and meanwhile, in the embodiment, the encryption algorithm corresponds to the anti-encryption algorithm and is the anti-algorithm.
Then, the identity of the user is confirmed through testing, which comprises the following steps:
s4-3-2.1: randomly selecting a set number of questions from a question bank, and sequentially displaying the questions to a user;
s4-3-2.2: receiving the answer of the user, and comparing the answer of the user with the standard answer of the question to judge errors;
s4-3-2.3: counting the number of questions with wrong answers by the user, comparing the number of questions with wrong answers by the user with the set number of errors, and if the number of questions with wrong answers by the user is larger than the set number of errors, judging that the answer of the user is wrong, otherwise, judging that the answer of the user is correct.
In the technical scheme, the identity of the user is verified in a question-answer mode, so that the identity of the user is more accurate when being determined.
Firstly, the identity accuracy of the user can be judged through dynamic identity verification, then the identity of the user is confirmed through testing, and further determination is carried out on the identity of the user, so that the determination of the identity of the user is more accurate.
In summary, the invention discloses a financial management method with a remote access function, comprising the following steps: s1: dividing the identity grades of the connected users in the computer intranet of the enterprise, and simultaneously determining the users of each identity grade which can be connected with the user of each identity grade; s2: the method comprises the steps that through configuration of a computer intranet of an enterprise, a user is enabled to identify the identity of the user before accessing the computer intranet, and the identity grade of the currently accessed user is determined according to the identity of the user; s3: displaying the user with the identity grade which can be accessed by the user to the user, opening the port of the user which can be accessed, allowing the user to select to access, and providing the access of the user; s4: monitoring the operation of the user, and accessing the authority of the user when the user views the financial statement; s5: after the user passes the authority access, step S4 is executed, and when the user does not pass the authority access, the port of the currently accessed user is cut off. The invention shields the user authority through the configuration of the computer network, and simultaneously, when viewing the financial statement data, the invention also verifies the authority of the user in real time, thereby ensuring the data security of the financial statement.
The foregoing disclosure is merely illustrative of some embodiments of the invention, but the embodiments are not limited thereto and variations within the scope of the invention will be apparent to those skilled in the art.

Claims (1)

1. A financial management method with remote access function, comprising the steps of:
s1: dividing the identity grades of the connected users in the computer intranet of the enterprise, and simultaneously determining the users of each identity grade which can be connected with the user of each identity grade;
s2: the method comprises the steps that through configuration of a computer intranet of an enterprise, a user is enabled to identify the identity of the user before accessing the computer intranet, and the identity grade of the currently accessed user is determined according to the identity of the user;
s3: displaying the user with the identity grade which can be accessed by the user to the user, opening the port of the user which can be accessed, allowing the user to select to access, and providing the access of the user;
s4: monitoring the operation of the user, and accessing the authority of the user when the user views the financial statement;
s5: after the user passes the authority access, executing step S4, and when the user does not pass the authority access, cutting off the port of the currently accessed user;
after the user passes the authority access, the operation can be continued in the accessed user, the user is still in a monitored state, and when the user does not pass the authority access, the port of the currently accessed user is cut off, so that the users are disconnected, and if the users need to be connected again, the request needs to be re-sent;
in step S4, the steps of:
s4-1: monitoring the operation of the accessed user through a monitor, and acquiring a file to be acquired by the operation of the user in real time;
s4-2: extracting a file to be acquired by the operation of a user to obtain the type of the file to be acquired by the operation of the user;
s4-3: when the type of the file to be acquired by the operation of the user is a financial statement, accessing the authority of the user;
in step S4-2, firstly converting the file into a text document format, extracting keywords in the text document format, and finally searching the type corresponding to the keywords in a type database according to the keywords to be used as the type of the file to be acquired by the operation of the user; the type database is used for storing keywords and types corresponding to the keywords;
in step S4-3, the access to the user is authorized, firstly, the user is authenticated through dynamic authentication, and then the identity of the user is confirmed through testing;
the identity verification is carried out on the user through dynamic identity verification, and the method comprises the following steps:
s4-3-1.1: generating a verification code, encrypting the verification code through an encryption algorithm to obtain verification information, and finally transmitting the verification information to a corresponding mobile phone of a user;
s4-3-1.2: receiving verification information input by a user, and decoding the verification information input by the user through an anti-encryption algorithm to obtain an anti-verification code;
s4-3-1.3: comparing the anti-verification code with the verification code, if the anti-verification code is consistent with the verification code, the verification is successful, and if the anti-verification code is inconsistent with the verification code, the verification is failed;
confirming the identity of the user through testing, comprising the following steps:
s4-3-2.1: randomly selecting a set number of questions from a question bank, and sequentially displaying the questions to a user;
s4-3-2.2: receiving the answer of the user, and comparing the answer of the user with the standard answer of the question to judge errors;
s4-3-2.3: counting the number of questions with wrong user answers and counting the number of questions with wrong user answers
The amount is compared with the set error amount, if the amount is larger than the set error amount, the user is considered to answer the error,
otherwise, the user is considered to answer correctly.
CN201911128829.9A 2019-11-18 2019-11-18 Financial management method with remote access function Active CN110930234B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911128829.9A CN110930234B (en) 2019-11-18 2019-11-18 Financial management method with remote access function

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911128829.9A CN110930234B (en) 2019-11-18 2019-11-18 Financial management method with remote access function

Publications (2)

Publication Number Publication Date
CN110930234A CN110930234A (en) 2020-03-27
CN110930234B true CN110930234B (en) 2024-03-12

Family

ID=69854158

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911128829.9A Active CN110930234B (en) 2019-11-18 2019-11-18 Financial management method with remote access function

Country Status (1)

Country Link
CN (1) CN110930234B (en)

Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105450672A (en) * 2016-01-05 2016-03-30 上海大之商科技发展股份有限公司 Internal network secure transmission method and system of financial data
CN105704095A (en) * 2014-11-26 2016-06-22 阿里巴巴集团控股有限公司 Identity authentication method and identity authentication device
CN106209903A (en) * 2016-08-03 2016-12-07 苏州浩悦商业管理有限公司 A kind of remote access financial system with encryption device
CN106685912A (en) * 2016-08-09 2017-05-17 厦门天锐科技股份有限公司 Secure access method of application system
CN107315963A (en) * 2017-06-06 2017-11-03 太仓鸿策腾达网络科技有限公司 A kind of financial management method with remote access function
CN107770191A (en) * 2017-11-03 2018-03-06 黑龙江工业学院 A kind of finicial administration of enterprise system with security protection
CN108040046A (en) * 2017-12-07 2018-05-15 中国银行股份有限公司 Data access control method and device
CN108288224A (en) * 2018-04-16 2018-07-17 洛阳师范学院 A kind of finicial administration of enterprise system
CN108897997A (en) * 2018-06-25 2018-11-27 武汉凡果信息技术股份有限公司 A kind of financial security system and its management method
CN109818935A (en) * 2018-05-04 2019-05-28 360企业安全技术(珠海)有限公司 User authority control method and device, storage medium, computer equipment
CN110245475A (en) * 2019-05-30 2019-09-17 阿里巴巴集团控股有限公司 Auth method and device
CN110287660A (en) * 2019-05-21 2019-09-27 深圳壹账通智能科技有限公司 Access right control method, device, equipment and storage medium
CN110288315A (en) * 2019-06-18 2019-09-27 浙江无极互联科技有限公司 A kind of financial management computer system

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7356837B2 (en) * 2001-08-29 2008-04-08 Nader Asghari-Kamrani Centralized identification and authentication system and method
SG11201605718PA (en) * 2014-01-13 2016-08-30 Patricia Lee System and method for financial management

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105704095A (en) * 2014-11-26 2016-06-22 阿里巴巴集团控股有限公司 Identity authentication method and identity authentication device
CN105450672A (en) * 2016-01-05 2016-03-30 上海大之商科技发展股份有限公司 Internal network secure transmission method and system of financial data
CN106209903A (en) * 2016-08-03 2016-12-07 苏州浩悦商业管理有限公司 A kind of remote access financial system with encryption device
CN106685912A (en) * 2016-08-09 2017-05-17 厦门天锐科技股份有限公司 Secure access method of application system
CN107315963A (en) * 2017-06-06 2017-11-03 太仓鸿策腾达网络科技有限公司 A kind of financial management method with remote access function
CN107770191A (en) * 2017-11-03 2018-03-06 黑龙江工业学院 A kind of finicial administration of enterprise system with security protection
CN108040046A (en) * 2017-12-07 2018-05-15 中国银行股份有限公司 Data access control method and device
CN108288224A (en) * 2018-04-16 2018-07-17 洛阳师范学院 A kind of finicial administration of enterprise system
CN109818935A (en) * 2018-05-04 2019-05-28 360企业安全技术(珠海)有限公司 User authority control method and device, storage medium, computer equipment
CN108897997A (en) * 2018-06-25 2018-11-27 武汉凡果信息技术股份有限公司 A kind of financial security system and its management method
CN110287660A (en) * 2019-05-21 2019-09-27 深圳壹账通智能科技有限公司 Access right control method, device, equipment and storage medium
CN110245475A (en) * 2019-05-30 2019-09-17 阿里巴巴集团控股有限公司 Auth method and device
CN110288315A (en) * 2019-06-18 2019-09-27 浙江无极互联科技有限公司 A kind of financial management computer system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
高校财务信息化建设中VPN技术的应用;钟建平;;会计之友(上旬刊)(05);全文 *

Also Published As

Publication number Publication date
CN110930234A (en) 2020-03-27

Similar Documents

Publication Publication Date Title
US11138300B2 (en) Multi-factor profile and security fingerprint analysis
US11190527B2 (en) Identity verification and login methods, apparatuses, and computer devices
US6532459B1 (en) System for finding, identifying, tracking, and correcting personal information in diverse databases
CN106330850B (en) Security verification method based on biological characteristics, client and server
US7509497B2 (en) System and method for providing security to an application
US20210136073A1 (en) Identity authentication method, personal security kernel node, device, and medium
CN110957025A (en) Medical health information safety management system
US8726358B2 (en) Identity ownership migration
US7748042B2 (en) Security vulnerability determination in a computer system
US20100154066A1 (en) System and Method for Managing Security Testing
CN114117264A (en) Illegal website identification method, device, equipment and storage medium based on block chain
CN112150113A (en) Method, device and system for borrowing file data and method for borrowing data
CN113326488A (en) Personal information protection system and method
CN112287326A (en) Security authentication method and device, electronic equipment and storage medium
US20020166066A1 (en) Method of restricting viewing web page and server
US20180039771A1 (en) Method of and server for authorizing execution of an application on an electronic device
CN114513373A (en) Trusted data exchange method, device, system, electronic equipment and storage medium
Karegar et al. Fingerprint recognition on mobile devices: widely deployed, rarely understood
CN110930234B (en) Financial management method with remote access function
KR20050010430A (en) A method of authenticating users by using one time password and a system thereof
JP2004070814A (en) Server security management method, device and program
KR20190012026A (en) System and method for login authentication processing
Chen et al. Collaborative security annotation and online testing for web APIs
CN107948126A (en) A kind of report inspection method and equipment
US20230308450A1 (en) Authentication management computer for identity authentication, and identity authentication system and identity authentication method using authentication management computer

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant