CN111314362B - Network security verification method and system for bank security system - Google Patents

Network security verification method and system for bank security system Download PDF

Info

Publication number
CN111314362B
CN111314362B CN202010114594.4A CN202010114594A CN111314362B CN 111314362 B CN111314362 B CN 111314362B CN 202010114594 A CN202010114594 A CN 202010114594A CN 111314362 B CN111314362 B CN 111314362B
Authority
CN
China
Prior art keywords
verification
network
page
request information
code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN202010114594.4A
Other languages
Chinese (zh)
Other versions
CN111314362A (en
Inventor
范强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hunan Police Academy
Original Assignee
Hunan Police Academy
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hunan Police Academy filed Critical Hunan Police Academy
Priority to CN202010114594.4A priority Critical patent/CN111314362B/en
Publication of CN111314362A publication Critical patent/CN111314362A/en
Application granted granted Critical
Publication of CN111314362B publication Critical patent/CN111314362B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/101Access control lists [ACL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • H04L67/141Setup of application sessions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/254Management at additional data server, e.g. shopping server, rights management server
    • H04N21/2541Rights Management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/258Client or end-user data management, e.g. managing client capabilities, user preferences or demographics, processing of multiple end-users preferences to derive collaborative data
    • H04N21/25808Management of client data
    • H04N21/25816Management of client data involving client authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast

Abstract

The invention discloses a network security verification method of a bank security system, which comprises the following steps: establishing a first network verification page and a second network verification page which are connected with a storage server; the external equipment sends verification request information to the storage server through the first network verification page or the second network verification page, and preprocesses the verification request information so that the verification request information is matched with the first network verification page or the second network verification page; the storage server receives the preprocessed verification request information and sends the verification request information to the verification server; the verification server verifies whether the verification request information meets the requirements, if so, the verification is passed, the storage server and the external equipment establish a data sharing channel, otherwise, the verification is not passed, and warning information is sent out. The invention also provides a network security verification system of the bank security system. By implementing the invention, the safety of the bank security system is greatly improved.

Description

Network security verification method and system for bank security system
Technical Field
The invention relates to the technical field of bank security systems, in particular to a network security verification method and a network security verification system of a bank security system.
Background
The bank is located in the downtown block of the city, commercial building, the periphery of residential garden, etc., belongs to the key security unit, and it has the characteristics of dispersion, diversity, expensive facilities, complicated personnel entering and exiting, wide management related area, etc. As the main circulation place of the current social currency and the important link of national economic operation, the novel currency is widely served in various domestic industries by unique functions and advanced technologies. Therefore, it is very important to improve the scientificity and security of the bank system. Banks need to be dedicated to the research of security protection in the financial industry, and an efficient, accurate, safe and reliable security system is developed.
In a traditional bank security system, video monitoring equipment is most commonly used to monitor and record videos around and in a bank 24 hours a day to serve as important evidence for case investigation and treatment after the fact of a public security department, and generally, a monitored storage server can be directly connected with a police server to provide channels for quick check or copy and the like. To prevent information in a storage server from being arbitrarily used. For this reason, it is necessary to design a verification system so that anyone/unit needs to pass the verification when accessing the bank security system to prevent the cyber attack of criminals.
Disclosure of Invention
The invention aims to provide a network security verification system and a network security verification method of a bank security system, which aim to overcome the defects in the prior art.
In order to achieve the purpose, the technical scheme adopted by the invention is as follows:
a network security verification method of a bank security system comprises a storage server, and the verification method is applied to the verification server and comprises the following steps:
establishing a first network verification page and a second network verification page which are connected with a storage server;
the method comprises the steps that an external device sends verification request information to a storage server through a first network verification page or a second network verification page, and preprocesses the verification request information to enable the verification request information to be matched with the first network verification page or the second network verification page, wherein the verification request information at least comprises a request code, a password and a unique distribution code, and verification bits used for guiding the request code to be matched with the first network verification page or the second network verification page are arranged in the request code;
the storage server receives the preprocessed verification request information and sends the verification request information to a verification server;
and the verification server verifies whether the verification request information meets the requirements, if so, the verification is passed, the storage server and the external equipment establish a data sharing channel, otherwise, the verification is not passed, and warning information is sent.
Further, when establishing a first network authentication page and a second network authentication page in communication with the storage server, configuring a first check bit associated with the first network authentication page and configuring a second check bit associated with the second network authentication page, wherein the first check bit and the second check bit are independent of each other and the first check bit and the second check bit match the authentication bit in the request code.
Further, the step of preprocessing the verification request information to match the verification request information with the first network verification page or the second network verification page specifically includes: matching the verification bit in the request code with the first check bit or the second check bit, if the verification bit is matched with the first check bit or the second check bit, finishing preprocessing, and if the verification bit is not matched with the second check bit, further comprising:
and switching the first network verification page or the second network verification page into a second network verification page or a first network channel, preprocessing the verification request information again, finishing preprocessing if the verification request information is matched with the second network verification page or the first network channel, and finishing the verification step if the verification fails.
Further, after the storage server receives the preprocessed authentication request information, the method further includes: clearing the verification request information records cached in the first network verification page or the second network verification page, and recording the verification request information in a storage server in the form of a second information record table.
Further, the verifying whether the verification request information meets the requirement by the verification server specifically includes:
verifying whether the password in the verification request information is correct or not, if so, continuing to execute, otherwise, terminating execution;
verifying whether the unique distribution code in the verification request information exists in a first information recording table preset in a verification server or not, if so, stopping the execution and sending out alarm information, otherwise, continuing the execution;
and verifying whether the unique distribution code in the verification request information exists in a second information recording table preset in the verification server or not, if so, verifying the unique distribution code, establishing a data sharing channel between the storage server and the external equipment, and if not, verifying the unique distribution code not to pass.
Further, when verifying whether the unique distribution code in the verification request information exists in a second information recording table preset in the verification server, if the first verification is failed, popping up a configuration text box of the unique distribution code on the first network verification page or the second network verification page, filling a new unique distribution code in the user, covering the unique distribution code in the first verification request information by the new unique distribution code, verifying whether the updated unique distribution code exists in the second information recording table preset in the verification server, if so, verifying to be passed, establishing a data sharing channel between the storage server and the external device, and if not, verifying to be failed, terminating execution and issuing warning information.
Further, when verifying whether the unique distribution code in the verification request information exists in a second information recording table preset in the verification server, if at least two times of verification fails, the method further includes: and the verification server records the unique distribution code in a preset first information recording table.
Further, the unique allocation code in the verification request information sent by the external device is formed by combining numbers, letters and symbols or is formed by an IP address of the external device;
and when the unique allocation code is formed by combining numbers, letters and symbols, if at least two times of verification fails, the verification server also acquires the IP address of the external equipment and records the IP address in a preset first information recording table.
Further, when the unique allocation code is formed by combining numbers, letters and symbols, if verification fails for at least two times, the verification server automatically shields the external equipment corresponding to the IP address.
The invention also provides a network security verification system of the bank security system, which comprises the following components:
the page unit is used for establishing a first network verification page and a second network verification page which are connected with the storage server;
the device comprises a preprocessing unit and a storage server, wherein the preprocessing unit is used for preprocessing verification request information after an external device sends the verification request information to the storage server through a first network verification page or a second network verification page so as to enable the verification request information to be matched with the first network verification page or the second network verification page, the verification request information at least comprises a request code, a password and a unique distribution code, and a verification bit used for guiding the request code to be matched with the first network verification page or the second network verification page is arranged in the request code;
the sending unit is used for sending the verification request information to a verification server after the storage server receives the verification request information which is preprocessed;
and the verification unit is used for verifying whether the verification request information meets the requirements or not by the verification server, if so, the verification is passed, the storage server and the external equipment establish a data sharing channel, otherwise, the verification is not passed, and warning information is sent out.
Compared with the prior art, the invention has the advantages that: the invention matches the verification request information with the network verification page through the preprocessing, verifies whether the verification request information meets the requirements through the verification server, and can acquire the information in the storage server after the verification is passed, thereby greatly improving the safety of the bank security system.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
FIG. 1 is a flow chart of the network security verification method of the bank security system of the present invention.
Fig. 2 is a specific flowchart of the authentication server verifying whether the authentication request information meets the requirements in the present invention.
FIG. 3 is a schematic diagram of a first network authentication page in the present invention.
FIG. 4 is a schematic diagram of a second network authentication page in the present invention.
Fig. 5 is a block diagram of an embodiment of the present invention.
Fig. 6 is a frame diagram of the network security verification system of the bank security system of the present invention.
Detailed Description
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this application belongs; the terminology used in the description of the application herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the application; the terms "including" and "having," and any variations thereof, in the description and claims of this application and the description of the above figures are intended to cover non-exclusive inclusions. The terms "first," "second," and the like in the description and claims of this application or in the above-described drawings are used for distinguishing between different objects and not for describing a particular order.
Reference herein to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment can be included in at least one embodiment of the application. The appearances of the phrase in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. It is explicitly and implicitly understood by one skilled in the art that the embodiments described herein can be combined with other embodiments.
In order to make the technical solutions better understood by those skilled in the art, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the accompanying drawings.
Referring to fig. 1-2, the present embodiment provides a network security verification method for a bank security system, where the bank security system includes a storage server, and the method includes the following steps:
step S10: and establishing a first network authentication page and a second network authentication page which are connected with the storage server.
In this embodiment, the first network authentication page and the second network authentication page are one login page, which is to say that the present embodiment provides two login pages, where the first network authentication page may be a general login page, for example: for internal use in a bank, the second network verifies that the page is a dedicated landing page, for example: the authority of the first network authentication page and the authority of the second network authentication page after login can be set according to actual needs, for example: the first network verification page can only be viewed after logging in and cannot be subjected to any operations such as copying, and the second network verification page can be viewed and copied after logging in.
Specifically, when a first network verification page and a second network verification page which are communicated with the storage server are established, a first check bit which is associated with the first network verification page is configured, and a second check bit which is associated with the second network verification page is configured, wherein the first check bit and the second check bit are independent and different from each other, and the first check bit and the second check bit are matched with the verification bit in the request code, so that subsequent preprocessing operation is facilitated.
Step S20: the external equipment sends verification request information to a storage server through a first network verification page or a second network verification page, the storage server preprocesses the verification request information to enable the verification request information to be matched with the first network verification page or the second network verification page, and the specific method comprises the following steps: matching the verification bit in the request code with the first check bit or the second check bit, if the verification bit is matched with the first check bit or the second check bit, finishing preprocessing, and if the verification bit is not matched with the second check bit, the method further comprises the following steps: and switching the first network verification page or the second network verification page into a second network verification page or a first network channel, preprocessing the verification request information again, finishing preprocessing if the verification request information is matched with the second network verification page or the first network channel, and finishing the verification step if the verification fails.
In this embodiment, the verification request information at least includes a request code, a password, and a unique allocation code, where a verification bit for guiding the request code to match with the first network verification page or the second network verification page is provided in the request code, and when the verification method is used specifically, the first network verification page or the second network verification page may be as shown in fig. 3 and 4, and three text boxes, that is, a request code text box, a password text box, and a unique allocation code text box, are provided in the first network verification page and the second network verification page, so as to be filled in by a user.
In this embodiment, the authentication request information does not have a registration function, that is, an individual or an entity cannot acquire the authentication request information through registration, but can only distribute the authentication request information through a background, so as to ensure the security of the authentication request information.
Such as: when a first network authentication page (figure 3) is selected for logging, the storage server preprocesses authentication request information during logging, namely, the authentication bit in the request code is matched with the first check bit, if the authentication bit is matched with the first check bit, the preprocessing is completed, and if the authentication bit is not matched, the first network authentication page (figure 3) is automatically switched to a second network authentication page (figure 4) for preprocessing again.
In this embodiment, matching the verification bit in the request code with the first parity bit or the second parity bit is implemented according to a set matching rule, which can be set by itself but needs to ensure uniqueness. For example, as shown in table 1 below, the matching rule is: the request code verification bit is converted into a lower case and is shifted backwards by one bit according to the alphabetical order, when the request code verification bit is actually used, the first check bit/the second check bit is fixed and unchanged, the request code verification bit is converted according to the rule, if the converted request code verification bit is consistent with the check bit, the converted request code verification bit is matched (the first line of the table 1), and if the converted request code verification bit is inconsistent with the check bit, the converted request code verification bit is not matched (the second line of the table 1).
TABLE 1
Figure BDA0002389712220000051
Figure BDA0002389712220000061
Step S30: and the storage server receives the preprocessed verification request information and sends the verification request information to the verification server.
In this embodiment, after the storage server receives the preprocessed verification request information, the method further includes: clearing the verification request information records cached in the first network verification page or the second network verification page, wherein the clearing records can prevent other third persons from borrowing machines, and recording the verification request information in a storage server in the form of a second information record table. For example, when a first network authentication page is selected for login and authentication request information is sent to the storage server after preprocessing is completed, the filled-in authentication request information is clarified at the first network authentication page, and the authentication request information is stored in a second information recording table, and is recorded in a table form so as to facilitate later statistics, for example: the number of times of registration of a certain authentication request message is the largest, which can facilitate information management, and the tabular form of the second information recording table can be referred to as table 2.
TABLE 2
Sorting Verifying request information
1 Request code, password and unique assignment code 1
2 Request code, password and unique assignment code 2
…… ……
n Request code, password and unique allocation code n
Step S40: and the verification server verifies whether the verification request information meets the requirements, if so, the verification is passed, the storage server and the external equipment establish a data sharing channel, otherwise, the verification is not passed, and warning information is sent.
Specifically, the verifying whether the verification request information meets the requirement by the verification server specifically includes:
step S410: and verifying whether the password in the verification request information is correct or not, namely verifying whether the password in the verification request information is consistent with the distribution or not, if so, continuing to execute, otherwise, terminating execution.
Step S420: and verifying whether the unique distribution code in the verification request information exists in a first information recording table preset in a verification server or not, if so, stopping executing and sending out alarm information, otherwise, continuing executing, wherein the first information recording table (shown in table 3) is equivalent to a blacklist, namely the unique distribution codes which are denied before are all stored in the table, and the verification is not passed as long as the unique distribution codes corresponding to the unique distribution codes in the table exist in the follow-up process, so that the safety and the effectiveness of data are improved.
TABLE 3
Sorting Unique allocation code IP address
1 Unique assignment code 1
2 Unique assignment code 2
…… ……
n Unique allocation code n
Step S430: when the unique distribution code in the verification request information exists in a first information recording table preset in the verification server, whether the unique distribution code in the verification request information exists in a second information recording table (table 2) preset in the verification server is verified, if yes, the verification is passed, the storage server and the external device establish a data sharing channel, the external device can check and copy data in the storage server according to the authority, and if not, the verification is not passed.
Specifically, when the verification request information is manually filled in, an error may occur, and for this reason, the present embodiment further provides: when the unique distribution code in the verification request information is verified to be in a second information recording table preset in a verification server, if the verification is failed for the first time, a configuration text box of the unique distribution code is popped up on the first network verification page or the second network verification page, a user fills in a new unique distribution code, the new unique distribution code covers the unique distribution code in the verification request information for the first time, and verifies whether the updated unique distribution code is in the second information recording table preset in the verification server, if the unique distribution code exists, the verification is passed, the storage server and the external device establish a data sharing channel, and if the unique distribution code does not exist, the execution is stopped, and warning information is issued.
In this embodiment, when verifying whether the unique allocation code in the verification request information exists in a second information recording table preset in the verification server, if at least two times of verification fails, the method further includes: and the authentication server records the unique distribution code in a preset first information recording table (table 2). That is, when the unique allocation codes filled twice are not verified, that is, the unique allocation codes are at risk of leakage, and are directly listed in the blacklist, and are not allocated in the subsequent allocation.
In this embodiment, the unique allocation code in the verification request message sent by the external device is formed by combining numbers, letters and symbols or is formed by an IP address of the external device, and may be allocated as needed during allocation, for example: the unique assignment code is composed of numbers, letters and symbols when assigned to the public channel (i.e., the first network authentication page), and is composed of an IP address of an external device when assigned to the private channel (i.e., the second network authentication page), and can be set to be used only under the specific IP address.
In this embodiment, when the unique allocation code is formed by combining numbers, letters, and symbols, if at least two times of verification fails, the verification server further obtains an IP address of the external device, and records the IP address in a preset first information recording table (see table 3).
Further, when the unique allocation code is formed by combining numbers, letters and symbols, if verification fails for at least two times, the verification server automatically shields the external equipment corresponding to the IP address. Namely, a network blacklist is established, and the subsequent login is only required under the IP address, namely the login is not passed, so that the safety is further improved, and the attack of lawbreakers under the same network is avoided.
In order to make those skilled in the art better understand the scheme of the present application, a network security verification system of a bank security system in the embodiment of the present application is clearly and completely described with reference to fig. 5.
As shown in fig. 5, the system architecture may include an external device 100, a storage server 200, and an authentication server 300, which are connected via a network, the network is used to provide a medium for communication links, and the network may include various connection types, such as wired, wireless communication links, or fiber optic cables.
The external device 100 in the present application may be various electronic devices having a display screen and supporting web browsing, including but not limited to a smart phone, a tablet computer, an e-book reader, an MP3 player (Moving Picture experts Group Audio Layer III, motion Picture experts compression standard Audio Layer 3), an MP4 player (Moving Picture experts Group Audio Layer IV, motion Picture experts compression standard Audio Layer 4), a laptop portable computer, a desktop computer, and the like.
The storage server 200 of the present application is mainly a server in a bank security system, and is used for storing monitoring video information and the like.
The network security verification method of the bank security system of the present application is generally performed by the verification server 300, and accordingly, the network security verification system of the bank security system is generally installed in the external device 100.
Referring to fig. 6, the present invention further provides a network security verification system of a bank security system, including: the page unit 3100 is used for establishing a first network verification page and a second network verification page connected with the storage server; the preprocessing unit 3200 is configured to preprocess, after an external device sends verification request information to the storage server through a first network verification page or a second network verification page, the verification request information so that the verification request information matches the first network verification page or the second network verification page, where the verification request information at least includes a request code, a password, and a unique allocation code, and a verification bit used for directing the request code to match the first network verification page or the second network verification page is arranged in the request code; a sending unit 3300, configured to send the verification request information to a verification server after the storage server receives the verification request information that is preprocessed; a verification unit 3400, configured to verify whether the verification request information meets the requirement, if so, the verification is passed, and the storage server establishes a data sharing channel with the external device, otherwise, the verification is not passed, and issues warning information.
The invention matches the verification request information with the network verification page through the preprocessing, verifies whether the verification request information meets the requirements through the verification server, and can acquire the information in the storage server after the verification is passed, thereby greatly improving the safety of the bank security system.
It is to be understood that the above-described embodiments are merely illustrative of some, but not restrictive, of the broad invention, and that the appended drawings illustrate preferred embodiments of the invention and do not limit the scope of the invention. This application is capable of embodiments in many different forms and is provided for the purpose of enabling a thorough understanding of the disclosure of the application. Although the present application has been described in detail with reference to the foregoing embodiments, it will be apparent to one skilled in the art that the present application may be practiced without modification or with equivalents of some of the features described in the foregoing embodiments. All equivalent structures made by using the contents of the specification and the drawings of the present application are directly or indirectly applied to other related technical fields and are within the protection scope of the present application.

Claims (10)

1. A network security verification method of a bank security system comprises a storage server, and the verification method is applied to the verification server, and is characterized by comprising the following steps:
establishing a first network authentication page and a second network authentication page which are connected with a storage server, wherein the first network authentication page is a general login page, and the second network authentication page is a special login page;
the method comprises the steps that an external device sends verification request information to a storage server through a first network verification page or a second network verification page, and preprocesses the verification request information to enable the verification request information to be matched with the first network verification page or the second network verification page, wherein the verification request information at least comprises a request code, a password and a unique distribution code, and verification bits used for guiding the request code to be matched with the first network verification page or the second network verification page are arranged in the request code;
the storage server receives the preprocessed verification request information and sends the verification request information to a verification server;
and the verification server verifies whether the verification request information meets the requirements, if so, the verification is passed, the storage server and the external equipment establish a data sharing channel, otherwise, the verification is not passed, and warning information is sent.
2. The network security authentication method of a bank security system according to claim 1,
when a first network authentication page and a second network authentication page which are communicated with a storage server are established, a first check bit which is associated with the first network authentication page is configured, a second check bit which is associated with the second network authentication page is configured, the first check bit and the second check bit are independent, and the first check bit and the second check bit are matched with the authentication bit in the request code.
3. The network security authentication method of a bank security system according to claim 1,
the step of preprocessing the verification request information to match the verification request information with the first network verification page or the second network verification page specifically includes: matching the verification bit in the request code with the first check bit or the second check bit, if the verification bit is matched with the first check bit or the second check bit, finishing preprocessing, and if the verification bit is not matched with the second check bit, further comprising:
and switching the first network verification page or the second network verification page into another network verification page, preprocessing the verification request information again, finishing preprocessing if the verification request information is matched with the other network verification page, and finishing the verification step if the verification fails.
4. The network security authentication method of a bank security system according to claim 1,
after the storage server receives the preprocessed authentication request information, the method further comprises the following steps: clearing the verification request information records cached in the first network verification page or the second network verification page, and recording the verification request information in a storage server in the form of a second information record table.
5. The network security authentication method of a bank security system according to claim 1,
the verifying server verifying whether the verification request information meets the requirements specifically comprises:
verifying whether the password in the verification request information is correct or not, if so, continuing to execute, otherwise, terminating execution;
verifying whether the unique distribution code in the verification request information exists in a first information recording table preset in a verification server or not, if so, stopping the execution and sending out alarm information, otherwise, continuing the execution;
and verifying whether the unique distribution code in the verification request information exists in a second information recording table preset in the verification server or not, if so, verifying the unique distribution code, establishing a data sharing channel between the storage server and the external equipment, and if not, verifying the unique distribution code not to pass.
6. The network security authentication method of a bank security system according to claim 5,
when verifying whether the unique distribution code in the verification request information exists in a second information recording table preset in a verification server, if the verification is failed for the first time, popping up a configuration text box of the unique distribution code on the first network verification page or the second network verification page, after a user fills in a new unique distribution code, covering the unique distribution code in the verification request information for the first time by the new unique distribution code, verifying whether the new unique distribution code exists in the second information recording table preset in the verification server, if so, verifying to be passed, establishing a data sharing channel between the storage server and external equipment, and if not, verifying to be failed, terminating execution and issuing warning information.
7. The network security authentication method of a bank security system according to claim 6,
when verifying whether the unique distribution code in the verification request information exists in a second information recording table preset in a verification server, if at least two times of verification fails, the method further comprises: and the verification server records the unique distribution code in a preset first information recording table.
8. The network security authentication method of a bank security system according to claim 7,
the unique distribution code in the verification request information sent by the external equipment is formed by combining numbers, letters and symbols or is formed by the IP address of the external equipment;
and when the unique allocation code is formed by combining numbers, letters and symbols, if at least two times of verification fails, the verification server also acquires the IP address of the external equipment and records the IP address in a preset first information recording table.
9. The network security authentication method of a bank security system according to claim 8,
and when the unique allocation code is formed by combining numbers, letters and symbols, if verification fails for at least two times, the verification server automatically shields the external equipment corresponding to the IP address.
10. A network security verification system of a bank security system is characterized by comprising:
the page unit is used for establishing a first network authentication page and a second network authentication page which are connected with the storage server, wherein the first network authentication page is a general login page, and the second network authentication page is a special login page;
the device comprises a preprocessing unit and a storage server, wherein the preprocessing unit is used for preprocessing verification request information after an external device sends the verification request information to the storage server through a first network verification page or a second network verification page so as to enable the verification request information to be matched with the first network verification page or the second network verification page, the verification request information at least comprises a request code, a password and a unique distribution code, and a verification bit used for guiding the request code to be matched with the first network verification page or the second network verification page is arranged in the request code;
the sending unit is used for sending the verification request information to a verification server after the storage server receives the verification request information which is preprocessed;
and the verification unit is used for verifying whether the verification request information meets the requirements or not by the verification server, if so, the verification is passed, the storage server and the external equipment establish a data sharing channel, otherwise, the verification is not passed, and warning information is sent out.
CN202010114594.4A 2020-02-23 2020-02-23 Network security verification method and system for bank security system Expired - Fee Related CN111314362B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010114594.4A CN111314362B (en) 2020-02-23 2020-02-23 Network security verification method and system for bank security system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010114594.4A CN111314362B (en) 2020-02-23 2020-02-23 Network security verification method and system for bank security system

Publications (2)

Publication Number Publication Date
CN111314362A CN111314362A (en) 2020-06-19
CN111314362B true CN111314362B (en) 2022-02-18

Family

ID=71147701

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010114594.4A Expired - Fee Related CN111314362B (en) 2020-02-23 2020-02-23 Network security verification method and system for bank security system

Country Status (1)

Country Link
CN (1) CN111314362B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105072132A (en) * 2015-08-27 2015-11-18 宇龙计算机通信科技(深圳)有限公司 Validation method, validation system and communication device
CN109818807A (en) * 2019-03-12 2019-05-28 义乌工商职业技术学院 A kind of mobile terminal shares the method and system of network by computer

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103220281B (en) * 2013-04-03 2015-10-28 天地融科技股份有限公司 A kind of information processing method and system
CN105471808B (en) * 2014-05-28 2019-08-20 北京搜狗科技发展有限公司 Generate the method for identifying code and the method, apparatus and system of safety verification
CN107196950B (en) * 2017-06-12 2020-06-16 武汉斗鱼网络科技有限公司 Verification method, verification device and server
WO2019054914A1 (en) * 2017-09-13 2019-03-21 Fingerprint Cards Ab Methods and devices of enabling authentication of a user of a client device over a secure communication channel based on biometric data
CN109635550B (en) * 2018-12-12 2021-08-17 苏州思必驰信息科技有限公司 Permission verification method, gateway and system for cluster data
CN110336810B (en) * 2019-06-28 2022-06-14 华为云计算技术有限公司 Information sharing method, platform, computing device and storage medium

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105072132A (en) * 2015-08-27 2015-11-18 宇龙计算机通信科技(深圳)有限公司 Validation method, validation system and communication device
CN109818807A (en) * 2019-03-12 2019-05-28 义乌工商职业技术学院 A kind of mobile terminal shares the method and system of network by computer

Also Published As

Publication number Publication date
CN111314362A (en) 2020-06-19

Similar Documents

Publication Publication Date Title
EP3005648B1 (en) Terminal identification method, and method, system and apparatus of registering machine identification code
CN104158824B (en) Genuine cyber identification authentication method and system
CA3046858A1 (en) Method, apparatus, and system for processing two-dimensional barcodes
US20050240749A1 (en) Secure storage of data in a network
CN105430000A (en) Cloud computing security management system
CN107197041A (en) A kind of safe cloud computing system
CN103581184A (en) Method and system for mobile terminal to get access to intranet server
CN107797724A (en) Method, apparatus, computer equipment and computer-readable recording medium are shielded in record of attending a banquet
CN111797418B (en) Online service control method and device, service terminal, server and storage medium
CN106445399A (en) Control method of storage system, and storage system
CN113495920A (en) Content auditing system, method and device based on block chain and storage medium
CN112150113A (en) Method, device and system for borrowing file data and method for borrowing data
Doshi et al. A review paper on security concerns in cloud computing and proposed security models
CN106899561A (en) A kind of TNC authority control methods and system based on ACL
CN114866346B (en) Password service platform based on decentralization
CN108696540A (en) A kind of authorizing secure system and its authorization method
CN105162763A (en) Method and device for processing communication data
CN111314362B (en) Network security verification method and system for bank security system
CN109726187B (en) Hadoop-oriented adaptive permission control method and device
CN110855753A (en) Bank operation system, method and server
CN110708156A (en) Communication method, client and server
CN105100088A (en) Method and system for preventing illegal clone cable modem (CM) from accessing data over cable system interface specification (DOCSIS) network
CN113765672A (en) Medical attribute token access control method, system, storage medium and electronic device
CN113626857A (en) Meteorological information sharing service system based on visual plug-in and use method
CN110689463A (en) Teaching management platform

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20220218

CF01 Termination of patent right due to non-payment of annual fee