CN112333154A - Method for controlling authority based on dynamic password and plasma collector thereof - Google Patents

Method for controlling authority based on dynamic password and plasma collector thereof Download PDF

Info

Publication number
CN112333154A
CN112333154A CN202011110191.9A CN202011110191A CN112333154A CN 112333154 A CN112333154 A CN 112333154A CN 202011110191 A CN202011110191 A CN 202011110191A CN 112333154 A CN112333154 A CN 112333154A
Authority
CN
China
Prior art keywords
password
user name
dynamic password
user
timestamp
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011110191.9A
Other languages
Chinese (zh)
Inventor
王鹏
李川
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sichuan Tianfu Hunter Life Technology Co.,Ltd.
Original Assignee
Sichuan Jiuba Village Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sichuan Jiuba Village Information Technology Co ltd filed Critical Sichuan Jiuba Village Information Technology Co ltd
Priority to CN202011110191.9A priority Critical patent/CN112333154A/en
Publication of CN112333154A publication Critical patent/CN112333154A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps

Abstract

The invention discloses a dynamic password-based authority control method and a plasma collector thereof, belonging to the technical field of plasma collection, wherein the authority control method comprises the following steps: s1: the user logs in to carry out static password verification, and if the verification is successful, the login is successful; if the verification fails, the dynamic password verification is automatically carried out; s2: executing dynamic seal verification, inputting a dynamic password by a user, decomposing the dynamic password and acquiring a user name part and a timestamp part; respectively verifying the user name part and the timestamp part, and if both parts are successfully verified, the login is successful; otherwise, the login fails, so that the confidentiality of the related data of the medical instrument can be realized to a certain extent, the availability of the related data can be improved, the risk of data leakage is avoided to the maximum extent, and the flexible operation of the system can be ensured.

Description

Method for controlling authority based on dynamic password and plasma collector thereof
Technical Field
The invention belongs to the technical field of plasma collection, and particularly relates to a method for performing authority control based on a dynamic password and a plasma collection machine thereof.
Background
With the development of network technology, more and more medical devices have network connection functions for electronic data exchange or remote control, and the network attack threats are faced while the quality and efficiency of medical services are improved, so that the network security of the medical devices may not only violate the privacy of patients, but also generate risks of unintended operation of the medical devices, and the patients or users may be injured or die. Therefore, the network security of the medical device is one of the important components of the security and the effectiveness of the medical device, and the supplier of the medical device must ensure the confidentiality, integrity and availability of the data related to the medical device.
The medical instrument related data is mainly divided into two types: health data refers to private data indicating physiological and psychological health conditions, can be used for related information of personnel identification, and relates to privacy information of patients; the equipment data is data describing the running state of the equipment, is used for monitoring and controlling the running of the equipment or used for maintaining the equipment, and does not relate to privacy information of patients;
confidentiality: refers to the property that data cannot be utilized or known by unauthorized individuals, entities, i.e., medical-instrument-related data can only be accessed by authorized users in an authorized manner at an authorized time;
integrity: the characteristic of protecting the accuracy and the integrity of data is specified, namely the related data of the medical instrument is accurate and complete and is not tampered;
availability: refers to the property of being accessible and usable according to the requirements of authorized persons, entities, i.e. the medical device related data can be accessed and used in a desired manner at the right time.
In order to meet the confidentiality and availability of related data, medical equipment suppliers mostly divide users of machines into 3 types, and system administrators, ordinary users and equipment maintenance personnel strictly divide and limit the authority of the users through passwords, so that the operations of the users are carried out within an authorized range. However, in some cases, for example, a general user may forget his/her password and can only reset the user's password by a system administrator, if the system administrator cannot immediately deal with the problem at this time, the user will not work normally.
Disclosure of Invention
In view of the above, in order to solve the above problems in the prior art, the present invention provides a method for performing authority control based on a dynamic password and a plasma collection machine thereof, so as to achieve the purposes of implementing confidentiality of related data of medical devices to a certain extent, improving availability of related data, avoiding risk of data leakage to the greatest extent, and ensuring flexible operation of a system.
The technical scheme adopted by the invention is as follows: a method for controlling authority based on dynamic password comprises the following steps:
s1: the user logs in to carry out static password verification, and if the verification is successful, the login is successful; if the verification fails, the dynamic password verification is automatically carried out;
s2: performing dynamic seal verification
S201: inputting a dynamic password by a user, decomposing the dynamic password and acquiring a user name part and a timestamp part;
s202: respectively verifying the user name part and the timestamp part, and if both parts are successfully verified, the login is successful; otherwise, the login fails.
Further, the static password authentication includes:
s101: a user inputs a user name and a password on a login interface;
s102: after the user name is compared with the user name database, if the user name exists in the user name database, the next step is carried out; if not, ending;
s103: after the password is compared with the password database, if the password is the same as the password database, the login is successful; if not, the process proceeds to step S2 to perform static password authentication when the general user, the equipment maintenance staff and the system administrator log in.
Further, the dynamic password is generated by third-party software and is informed to a user, and the dynamic password at least comprises a user name part, a separation character and a time stamp part, so that the timeliness of the dynamic password is met.
Further, in the step S202, the user name part is verified by comparing with the user name database, and if the user name part does not exist, the login fails; and if the user name part exists, verifying the timestamp part, and verifying the user name through the dynamic password.
Further, in step S202, the verification method for the timestamp part is as follows:
s20201: acquiring the current equipment time, and calculating a current timestamp through an algorithm;
s20202: comparing the time stamp part with the current time stamp, if the time stamp part is the same as the current time stamp part, the login is successful, and after the login is completed, the user can carry out password resetting operation; if not, the login fails.
Further, in step S20201, the current timestamp is calculated by an asymmetric encryption algorithm, so as to satisfy the comparison between the current timestamp and the timestamp portion.
The invention also provides a plasma collector for authority control based on dynamic password, which comprises: the system comprises a central processing unit, a static password authentication module and a dynamic password authentication module which are respectively connected with the central processing unit;
the static password authentication module is used for inputting a static password by a user and authenticating the input static password, and is in communication connection with the dynamic password authentication module;
and the dynamic password verification module is used for inputting a dynamic password by a user, decomposing the dynamic password to produce and acquire a user name part and a time stamp part, and verifying the user name part and the time stamp part respectively.
Further, the static password authentication module includes:
the user name input module is used for inputting a user name by a user and comparing and verifying the user name with a user name database;
the password input module is used for inputting a password by a user and comparing and verifying the password with a password database;
the static password authentication is carried out when a common user, equipment maintenance personnel and a system administrator log in.
Further, the dynamic password at least comprises a user name part, a separation character and a time stamp part, so that the timeliness of the dynamic password is met.
Further, the dynamic password authentication module includes:
the dynamic password input port is used for inputting a dynamic password by a user;
the dynamic seal decomposition module is used for decomposing the dynamic password to generate a user name part and a time stamp part;
and the user name verification module and the time stamp verification module are respectively used for comparing and verifying the user name and the time stamp so that the user can perform password resetting operation after logging in through the dynamic password.
Further, the user name authentication module authenticates the user name part by comparing the user name part with a user name database, so as to authenticate the user name part in the dynamic password.
Furthermore, the timestamp verification module obtains the current equipment time and calculates the current timestamp through an algorithm, and compares the timestamp part with the current timestamp for verification so as to realize verification of the timestamp part in the dynamic password.
The invention has the beneficial effects that:
1. by adopting the dynamic password-based authority control method and the plasma collector thereof, provided by the invention, the authentication of the static password and the dynamic password is organically combined through the effective improvement of the authority control method, so that common users, maintenance personnel and system administrators can be allowed to temporarily log in the system for corresponding operation by inputting a dynamic password with timestamp information, and the dynamic password is invalid in a specified time. Therefore, the confidentiality of the related data of the medical equipment can be ensured to the maximum extent, and the availability of the related data can be improved.
Drawings
Fig. 1 is a flowchart of a method for performing authority control based on dynamic password according to the present invention.
Detailed Description
Reference will now be made in detail to embodiments of the present application, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to the same or similar modules or modules having the same or similar functionality throughout. The embodiments described below with reference to the drawings are exemplary only for the purpose of explaining the present application and are not to be construed as limiting the present application. On the contrary, the embodiments of the application include all changes, modifications and equivalents coming within the spirit and terms of the claims appended hereto.
Example 1
In this embodiment, a method for performing authority control based on a dynamic password is specifically provided, which is mainly used for authority control in a user login authentication phase, and aims to allow a user to temporarily log in a system by inputting a dynamic password with timestamp information to perform a corresponding operation (for example, a password resetting operation), and the dynamic password is invalid within a specified time, as shown in fig. 1, the method for performing authority control based on a dynamic password includes:
s1: the user logs in to carry out static password verification, and if the verification is successful, the login is successful; if the verification fails, the dynamic password verification is automatically carried out, wherein the static password verification comprises the following steps:
s101: a user inputs a user name and a password on a login interface;
s102: after the user name is compared with the user name database, whether the current user name exists in the user name database or not is searched according to the user name input by the user, and if yes, the next step is carried out; if not, ending;
s103: after the password is compared with the password database, whether the password of the corresponding user in the password database is the same as the password of the corresponding user is searched according to the password input by the user, and if the password is the same as the password, the login is successful; for example: when a common user logs in, if a correct common user name and a correct password are input, the common user logs in, and the content related to the authority of the common user is displayed;
when the equipment maintainer logs in, if the correct equipment maintainer user name and password are input, the equipment maintainer logs in, and the content related to the authority of the equipment maintainer is displayed;
when a system administrator logs in, if a correct system administrator user name and a correct system administrator password are input, the system administrator logs in, and the content related to the authority of the system administrator is displayed.
S2: if the static password authentication in S1 fails, for example: when the general user, the equipment maintainer and the system administrator forget the password, the dynamic seal verification is automatically executed, specifically as follows:
s201: inputting a dynamic password by a user, decomposing the dynamic password and acquiring a user name part and a timestamp part; the dynamic password is generated and informed to the user by third-party software, and can be informed to the user in a remote issuing mode. The dynamic password includes at least a username portion, a separation character, and a timestamp portion, such as: the dynamic password is: username + NGL + timestamp, or alternatively: username +98V + timestamp, where "NGL" and "98V" both represent separator characters. The dynamic password has timeliness, the timestamp part of the dynamic password can be accurate to year, month, day, hour, minute and second, and the accuracy of the dynamic password is selected according to different application scenes and service requirements; meanwhile, dynamic passwords are of indefinite length.
In practical application, a timestamp part is arranged after the character is separated in the dynamic password, and a user name encryption part is arranged before the character is separated in the dynamic password; and performing OR operation on the user name encryption part and the time stamp part to obtain the user name part.
S202: respectively verifying the user name part and the timestamp part, and if both parts are successfully verified, the login is successful; otherwise, the login fails. In practical application, under the condition that a common user forgets a password, if a correct common user name and a dynamic password with a timestamp are input, the common user can log in, and then the password can be reset; under the condition that the equipment maintainer forgets the password, if the correct equipment maintainer username and the dynamic password with the timestamp are input, the equipment maintainer can log in, and then the password resetting operation can be carried out; under the condition that a system administrator forgets a password, if a correct system administrator user name and a dynamic password with a time stamp are input, the login of the system administrator can be completed, and then the password resetting operation can be carried out.
The verification method for the user name part comprises the following steps: the user name part is verified by comparing with a user name database, namely whether the current user name part exists in the user name database is searched, and if the current user name part does not exist in the user name database, login is failed; if the username portion exists, then the timestamp portion is verified.
The verification method for the time stamp part is as follows:
s20201: acquiring current equipment time, and calculating a current timestamp through an asymmetric encryption algorithm;
s20202: comparing the timestamp part with the current timestamp, and if the timestamp part is the same as the current timestamp part, successfully logging in; if not, the login fails.
Based on the above, the control of the authority is realized through the static password authentication and the dynamic password authentication, and the login authentication of the user is completed.
Example 2
Based on the method for performing authority control based on dynamic password in embodiment 1, in this embodiment, a plasma collection machine for performing authority control based on dynamic password is provided, and the plasma collection machine includes: the system comprises a central processing unit, a static password authentication module and a dynamic password authentication module which are respectively connected with the central processing unit.
A part of: and the static password verification module is used for inputting a static password by a user and verifying the input static password, the static password comprises a user name and a password, the static password verification module is in communication connection with the dynamic password verification module, and when the static password verification fails, a signal is transmitted to the dynamic password verification module to start the dynamic password verification module to execute related actions. To ensure the authentication of the static password, the static password authentication module includes:
the user name input module is in communication connection with the user name database and used for inputting a user name by a user, comparing and verifying the user name with the user name stored in the user name database, feeding a verification signal back to the central processing unit, and starting the password input module to work if the verification is successful; if the verification fails, the central processing unit feeds back a signal to the display screen to prompt the user that the login fails.
The password input module is in communication connection with the password database and used for a user to input a password, comparing the password with the password database for verification and feeding back a verification signal to the central processing unit, and if the verification is successful, the central processing unit feeds back a signal to the display screen to prompt the user to log in successfully; if the verification fails, the central processing unit feeds back a signal to the display screen to prompt the user that the login fails.
The other part is as follows: and the dynamic password authentication module is used for inputting a dynamic password by a user, decomposing the dynamic password to produce and acquire a user name part and a time stamp part, and authenticating the user name part and the time stamp part respectively, wherein the dynamic password at least comprises a user name part, separation characters and a time stamp part, and is generated by third-party software. The dynamic password authentication module comprises the following components:
the dynamic password input port is used for inputting a dynamic password by a user, and the dynamic password comprises a timestamp;
the dynamic seal decomposition module is used for decomposing the dynamic password to generate a user name part and a time stamp part;
and the user name verification module and the time stamp verification module are respectively used for comparing and verifying the user name and the time stamp. The user name verification module compares the user name part with a user name database for verification, and if the verification is successful, the timestamp verification module is started to work; if the verification fails, a signal is fed back to the display screen through the central processing unit to prompt the user that the login fails;
the timestamp verification module calculates a current timestamp by acquiring current equipment time and an asymmetric encryption algorithm loaded in the timestamp verification module, compares a timestamp part with the current timestamp for verification, and if the verification is successful (the timestamp part is the same as the current timestamp), the central processing unit feeds back a signal to a display screen to prompt a user to log in successfully; if the verification fails (the timestamp part is different from the current timestamp), the central processing unit feeds back a signal to the display screen to prompt the user that the login fails.
It should be noted that, in the description of the present application, the terms "first", "second", etc. are used for descriptive purposes only and are not to be construed as indicating or implying relative importance. Further, in the description of the present application, the meaning of "a plurality" means at least two unless otherwise specified.
Any process or method descriptions in flow charts or otherwise described herein may be understood as representing modules, segments, or portions of code which include one or more executable instructions for implementing specific logical functions or steps of the process, and the scope of the preferred embodiments of the present application includes other implementations in which functions may be executed out of order from that shown or discussed, including substantially concurrently or in reverse order, depending on the functionality involved, as would be understood by those reasonably skilled in the art of the present application.
It should be understood that portions of the present application may be implemented in hardware, software, firmware, or a combination thereof. In the above embodiments, the various steps or methods may be implemented in software or firmware stored in memory and executed by a suitable instruction execution system. For example, if implemented in hardware, as in another embodiment, any one or combination of the following techniques, which are known in the art, may be used: a discrete logic circuit having a logic gate circuit for implementing a logic function on a data signal, an application specific integrated circuit having an appropriate combinational logic gate circuit, a Programmable Gate Array (PGA), a Field Programmable Gate Array (FPGA), or the like.
It will be understood by those skilled in the art that all or part of the steps carried by the method for implementing the above embodiments may be implemented by hardware related to instructions of a program, which may be stored in a computer readable storage medium, and when the program is executed, the program includes one or a combination of the steps of the method embodiments.
In addition, functional units in the embodiments of the present application may be integrated into one processing module, or each unit may exist alone physically, or two or more units are integrated into one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode. The integrated module, if implemented in the form of a software functional module and sold or used as a stand-alone product, may also be stored in a computer readable storage medium.
The storage medium mentioned above may be a read-only memory, a magnetic or optical disk, etc.
In the description herein, reference to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., means that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the application. In this specification, the schematic representations of the terms used above do not necessarily refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
Although embodiments of the present application have been shown and described above, it is understood that the above embodiments are exemplary and should not be construed as limiting the present application, and that variations, modifications, substitutions and alterations may be made to the above embodiments by those of ordinary skill in the art within the scope of the present application.

Claims (10)

1. A method for controlling authority based on dynamic password is characterized in that the method comprises the following steps:
s1: the user logs in to carry out static password verification, and if the verification is successful, the login is successful; if the verification fails, the dynamic password verification is automatically carried out;
s2: performing dynamic seal verification
S201: inputting a dynamic password by a user, decomposing the dynamic password and acquiring a user name part and a timestamp part;
s202: respectively verifying the user name part and the timestamp part, and if both parts are successfully verified, the login is successful; otherwise, the login fails.
2. The dynamic password-based privilege control method according to claim 1, wherein the static password authentication comprises:
s101: a user inputs a user name and a password on a login interface;
s102: after the user name is compared with the user name database, if the user name exists in the user name database, the next step is carried out; if not, ending;
s103: after the password is compared with the password database, if the password is the same as the password database, the login is successful; if not, the process proceeds to step S2.
3. The method of claim 1, wherein the dynamic password is generated by third-party software and is notified to the user, and the dynamic password comprises at least a user name portion, a separation character, and a timestamp portion.
4. The method for controlling authority based on dynamic password of claim 1, wherein in step S202, the user name part is verified by comparing with the user name database, and if the user name part does not exist, the login fails; if the username portion exists, then the timestamp portion is verified.
5. The method for controlling authority based on dynamic password as claimed in claim 1, wherein in step S202, the verification method for the timestamp part is as follows:
s20201: acquiring current equipment time, and calculating a current timestamp through an asymmetric encryption algorithm;
s20202: comparing the timestamp part with the current timestamp, and if the timestamp part is the same as the current timestamp part, successfully logging in; if not, the login fails.
6. The utility model provides a plasma collection machine based on dynamic password carries out access control which characterized in that, this plasma collection machine includes: the system comprises a central processing unit, a static password authentication module and a dynamic password authentication module which are respectively connected with the central processing unit;
the static password authentication module is used for inputting a static password by a user and authenticating the input static password, and is in communication connection with the dynamic password authentication module;
and the dynamic password verification module is used for inputting a dynamic password by a user, decomposing the dynamic password to produce and acquire a user name part and a time stamp part, and verifying the user name part and the time stamp part respectively.
7. The plasma collection machine for authority control based on dynamic password of claim 6, wherein the static password verification module comprises:
the user name input module is used for inputting a user name by a user and comparing and verifying the user name with a user name database;
and the password input module is used for inputting a password by a user and comparing and verifying the password with the password database.
8. The plasma collection machine for privilege control based on dynamic password of claim 6, wherein the dynamic password comprises at least a username portion, a separation character and a timestamp portion.
9. The plasma collection machine for authority control based on dynamic password of claim 6, wherein the dynamic password verification module comprises:
the dynamic password input port is used for inputting a dynamic password by a user;
the dynamic seal decomposition module is used for decomposing the dynamic password to generate a user name part and a time stamp part;
and the user name verification module and the time stamp verification module are respectively used for comparing and verifying the user name and the time stamp.
10. The plasma collection machine for authority control based on dynamic password of claim 9, wherein the user name verification module verifies the user name by comparing the user name part with a user name database; and the timestamp verification module obtains the current equipment time and calculates the current timestamp through an algorithm, and compares and verifies the timestamp part with the current timestamp.
CN202011110191.9A 2020-10-16 2020-10-16 Method for controlling authority based on dynamic password and plasma collector thereof Pending CN112333154A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011110191.9A CN112333154A (en) 2020-10-16 2020-10-16 Method for controlling authority based on dynamic password and plasma collector thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011110191.9A CN112333154A (en) 2020-10-16 2020-10-16 Method for controlling authority based on dynamic password and plasma collector thereof

Publications (1)

Publication Number Publication Date
CN112333154A true CN112333154A (en) 2021-02-05

Family

ID=74313914

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011110191.9A Pending CN112333154A (en) 2020-10-16 2020-10-16 Method for controlling authority based on dynamic password and plasma collector thereof

Country Status (1)

Country Link
CN (1) CN112333154A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116128492A (en) * 2023-04-14 2023-05-16 张家口市宣化金科钻孔机械有限公司 Method for controlling installment payment of drilling machine

Citations (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101414905A (en) * 2007-10-17 2009-04-22 谢丹 Various selectivity cipher safety authentication system and method
CN101582764A (en) * 2009-04-02 2009-11-18 北京飞天诚信科技有限公司 Method and system for identity authentication based on dynamic password
CN101662364A (en) * 2009-09-17 2010-03-03 北京飞天诚信科技有限公司 Method and system for safe login
US20100131756A1 (en) * 2008-11-26 2010-05-27 James Paul Schneider Username based authentication and key generation
CN102164141A (en) * 2011-04-24 2011-08-24 陈珂 Method for protecting security of account
CN102487376A (en) * 2010-12-01 2012-06-06 金蝶软件(中国)有限公司 Enterprise resource planning system login method, device and system
US20120151566A1 (en) * 2009-08-26 2012-06-14 Tencent Technology (Shenzhen) Company Limited Method and device for verifying dynamic password
US20120210408A1 (en) * 2009-10-30 2012-08-16 Zhou Lu Verification method and system thereof
CN103763105A (en) * 2014-01-07 2014-04-30 上海众人网络安全技术有限公司 Encryption method and device for login of Exchange corporate E-mails
US20140281498A1 (en) * 2013-03-14 2014-09-18 Comcast Cable Communications, Llc Identity authentication using credentials
CN105072132A (en) * 2015-08-27 2015-11-18 宇龙计算机通信科技(深圳)有限公司 Validation method, validation system and communication device
CN105338525A (en) * 2014-05-29 2016-02-17 广州市动景计算机科技有限公司 Login access processing method, apparatus and system
CN107864144A (en) * 2017-11-20 2018-03-30 珠海市魅族科技有限公司 Obtain method and device, computer installation and the storage medium of dynamic password
CN108183907A (en) * 2017-12-29 2018-06-19 浪潮通用软件有限公司 A kind of authentication method, server and Verification System
CN108632241A (en) * 2018-03-07 2018-10-09 湖南小步科技有限公司 A kind of multi-application system unified login method and apparatus
CN109544735A (en) * 2018-10-24 2019-03-29 天津大学 A kind of intelligent cipher lock control system of safety that supporting multi-operation mode
CN109818738A (en) * 2018-12-29 2019-05-28 广东电网有限责任公司 A kind of terminal safe logging method
CN109936447A (en) * 2019-01-31 2019-06-25 平安科技(深圳)有限公司 Encryption and authentication method, system and computer equipment based on timestamp
CN110012011A (en) * 2019-04-03 2019-07-12 北京奇安信科技有限公司 Method, apparatus, computer equipment and the storage medium for preventing malice from logging in
CN111243133A (en) * 2020-01-07 2020-06-05 杭州涂鸦信息技术有限公司 Bluetooth door lock system based on dynamic password generation and matching and unlocking method

Patent Citations (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101414905A (en) * 2007-10-17 2009-04-22 谢丹 Various selectivity cipher safety authentication system and method
US20100131756A1 (en) * 2008-11-26 2010-05-27 James Paul Schneider Username based authentication and key generation
CN101582764A (en) * 2009-04-02 2009-11-18 北京飞天诚信科技有限公司 Method and system for identity authentication based on dynamic password
US20120151566A1 (en) * 2009-08-26 2012-06-14 Tencent Technology (Shenzhen) Company Limited Method and device for verifying dynamic password
CN101662364A (en) * 2009-09-17 2010-03-03 北京飞天诚信科技有限公司 Method and system for safe login
US20120210408A1 (en) * 2009-10-30 2012-08-16 Zhou Lu Verification method and system thereof
CN102487376A (en) * 2010-12-01 2012-06-06 金蝶软件(中国)有限公司 Enterprise resource planning system login method, device and system
CN102164141A (en) * 2011-04-24 2011-08-24 陈珂 Method for protecting security of account
US20140281498A1 (en) * 2013-03-14 2014-09-18 Comcast Cable Communications, Llc Identity authentication using credentials
CN103763105A (en) * 2014-01-07 2014-04-30 上海众人网络安全技术有限公司 Encryption method and device for login of Exchange corporate E-mails
CN105338525A (en) * 2014-05-29 2016-02-17 广州市动景计算机科技有限公司 Login access processing method, apparatus and system
CN105072132A (en) * 2015-08-27 2015-11-18 宇龙计算机通信科技(深圳)有限公司 Validation method, validation system and communication device
CN107864144A (en) * 2017-11-20 2018-03-30 珠海市魅族科技有限公司 Obtain method and device, computer installation and the storage medium of dynamic password
CN108183907A (en) * 2017-12-29 2018-06-19 浪潮通用软件有限公司 A kind of authentication method, server and Verification System
CN108632241A (en) * 2018-03-07 2018-10-09 湖南小步科技有限公司 A kind of multi-application system unified login method and apparatus
CN109544735A (en) * 2018-10-24 2019-03-29 天津大学 A kind of intelligent cipher lock control system of safety that supporting multi-operation mode
CN109818738A (en) * 2018-12-29 2019-05-28 广东电网有限责任公司 A kind of terminal safe logging method
CN109936447A (en) * 2019-01-31 2019-06-25 平安科技(深圳)有限公司 Encryption and authentication method, system and computer equipment based on timestamp
CN110012011A (en) * 2019-04-03 2019-07-12 北京奇安信科技有限公司 Method, apparatus, computer equipment and the storage medium for preventing malice from logging in
CN111243133A (en) * 2020-01-07 2020-06-05 杭州涂鸦信息技术有限公司 Bluetooth door lock system based on dynamic password generation and matching and unlocking method

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
王淑婷等: "密码认证专利技术现状与发展趋势分析", 《中国发明与专利》 *
胡锦玲等: "基于Cookie的Web平台身份认证机制的研究与设计", 《江西科学》 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116128492A (en) * 2023-04-14 2023-05-16 张家口市宣化金科钻孔机械有限公司 Method for controlling installment payment of drilling machine

Similar Documents

Publication Publication Date Title
US9824194B2 (en) Application security framework
CN111082940B (en) Internet of things equipment control method and device, computing equipment and storage medium
CN110957025A (en) Medical health information safety management system
CN106031087B (en) Method and apparatus for Authentication Client voucher
CA2874189C (en) Cyber security analzer
EP2109955B1 (en) Provisioning of digital identity representations
EP2332285B1 (en) Methods and systems for securely managing virtualization platform
CN101277189B (en) Method and apparatus for accepting a digital identity of a user based on transitive trust among parties
US20100325687A1 (en) Systems and Methods for Custom Device Automatic Password Management
US20150288712A1 (en) Threat modeling and analysis
CN106533693B (en) Access method and device of railway vehicle monitoring and overhauling system
CN107871081A (en) A kind of computer information safe system
CN110365684A (en) Access control method, device and the electronic equipment of application cluster
US8683188B2 (en) Reboot controller to prevent unauthorized reboot
EP4109308A1 (en) Gradual credential disablement
Tasali et al. A flexible authorization architecture for systems of interoperable medical devices
JP2006119719A (en) Computer system and user authentication method
CN112333154A (en) Method for controlling authority based on dynamic password and plasma collector thereof
CN110222483A (en) Data processing method, data processing equipment, terminal and storage medium
Carminati et al. A system for timely and controlled information sharing in emergency situations
CN115967581A (en) Login verification method and device, electronic equipment and storage medium
US20210334085A1 (en) Systems and methods for secure over-the-air updates for cyber-physical systems
CN115643081A (en) Industrial control system authentication method and device and computer equipment
US11671415B2 (en) Application module for creating an assured record of a user interaction
CN114022161A (en) Independent source tracing system, method and device for original recording data of LIMS (laser induced mass spectrometry) system based on block chain and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20211122

Address after: 610041 No. 1888, Huanhu East Road, Eastern New Area, Chengdu, Sichuan (self declaration)

Applicant after: Sichuan Tianfu Hunter Life Technology Co.,Ltd.

Address before: 610041 704, 7, 1, 1800, Yizhou Avenue, high tech Zone, Chengdu, Sichuan

Applicant before: Sichuan jiuba Village Information Technology Co.,Ltd.

RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20210205