CN112333154A - Method for controlling authority based on dynamic password and plasma collector thereof - Google Patents
Method for controlling authority based on dynamic password and plasma collector thereof Download PDFInfo
- Publication number
- CN112333154A CN112333154A CN202011110191.9A CN202011110191A CN112333154A CN 112333154 A CN112333154 A CN 112333154A CN 202011110191 A CN202011110191 A CN 202011110191A CN 112333154 A CN112333154 A CN 112333154A
- Authority
- CN
- China
- Prior art keywords
- password
- user name
- dynamic password
- user
- timestamp
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 32
- 238000012795 verification Methods 0.000 claims abstract description 63
- 230000003068 static effect Effects 0.000 claims abstract description 31
- 238000012545 processing Methods 0.000 claims description 15
- 238000000926 separation method Methods 0.000 claims description 6
- 238000004891 communication Methods 0.000 claims description 5
- 230000008569 process Effects 0.000 claims description 4
- 238000000354 decomposition reaction Methods 0.000 claims description 3
- 230000006870 function Effects 0.000 description 4
- 238000012423 maintenance Methods 0.000 description 4
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000004075 alteration Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000036541 health Effects 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000009323 psychological health Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3297—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
Abstract
The invention discloses a dynamic password-based authority control method and a plasma collector thereof, belonging to the technical field of plasma collection, wherein the authority control method comprises the following steps: s1: the user logs in to carry out static password verification, and if the verification is successful, the login is successful; if the verification fails, the dynamic password verification is automatically carried out; s2: executing dynamic seal verification, inputting a dynamic password by a user, decomposing the dynamic password and acquiring a user name part and a timestamp part; respectively verifying the user name part and the timestamp part, and if both parts are successfully verified, the login is successful; otherwise, the login fails, so that the confidentiality of the related data of the medical instrument can be realized to a certain extent, the availability of the related data can be improved, the risk of data leakage is avoided to the maximum extent, and the flexible operation of the system can be ensured.
Description
Technical Field
The invention belongs to the technical field of plasma collection, and particularly relates to a method for performing authority control based on a dynamic password and a plasma collection machine thereof.
Background
With the development of network technology, more and more medical devices have network connection functions for electronic data exchange or remote control, and the network attack threats are faced while the quality and efficiency of medical services are improved, so that the network security of the medical devices may not only violate the privacy of patients, but also generate risks of unintended operation of the medical devices, and the patients or users may be injured or die. Therefore, the network security of the medical device is one of the important components of the security and the effectiveness of the medical device, and the supplier of the medical device must ensure the confidentiality, integrity and availability of the data related to the medical device.
The medical instrument related data is mainly divided into two types: health data refers to private data indicating physiological and psychological health conditions, can be used for related information of personnel identification, and relates to privacy information of patients; the equipment data is data describing the running state of the equipment, is used for monitoring and controlling the running of the equipment or used for maintaining the equipment, and does not relate to privacy information of patients;
confidentiality: refers to the property that data cannot be utilized or known by unauthorized individuals, entities, i.e., medical-instrument-related data can only be accessed by authorized users in an authorized manner at an authorized time;
integrity: the characteristic of protecting the accuracy and the integrity of data is specified, namely the related data of the medical instrument is accurate and complete and is not tampered;
availability: refers to the property of being accessible and usable according to the requirements of authorized persons, entities, i.e. the medical device related data can be accessed and used in a desired manner at the right time.
In order to meet the confidentiality and availability of related data, medical equipment suppliers mostly divide users of machines into 3 types, and system administrators, ordinary users and equipment maintenance personnel strictly divide and limit the authority of the users through passwords, so that the operations of the users are carried out within an authorized range. However, in some cases, for example, a general user may forget his/her password and can only reset the user's password by a system administrator, if the system administrator cannot immediately deal with the problem at this time, the user will not work normally.
Disclosure of Invention
In view of the above, in order to solve the above problems in the prior art, the present invention provides a method for performing authority control based on a dynamic password and a plasma collection machine thereof, so as to achieve the purposes of implementing confidentiality of related data of medical devices to a certain extent, improving availability of related data, avoiding risk of data leakage to the greatest extent, and ensuring flexible operation of a system.
The technical scheme adopted by the invention is as follows: a method for controlling authority based on dynamic password comprises the following steps:
s1: the user logs in to carry out static password verification, and if the verification is successful, the login is successful; if the verification fails, the dynamic password verification is automatically carried out;
s2: performing dynamic seal verification
S201: inputting a dynamic password by a user, decomposing the dynamic password and acquiring a user name part and a timestamp part;
s202: respectively verifying the user name part and the timestamp part, and if both parts are successfully verified, the login is successful; otherwise, the login fails.
Further, the static password authentication includes:
s101: a user inputs a user name and a password on a login interface;
s102: after the user name is compared with the user name database, if the user name exists in the user name database, the next step is carried out; if not, ending;
s103: after the password is compared with the password database, if the password is the same as the password database, the login is successful; if not, the process proceeds to step S2 to perform static password authentication when the general user, the equipment maintenance staff and the system administrator log in.
Further, the dynamic password is generated by third-party software and is informed to a user, and the dynamic password at least comprises a user name part, a separation character and a time stamp part, so that the timeliness of the dynamic password is met.
Further, in the step S202, the user name part is verified by comparing with the user name database, and if the user name part does not exist, the login fails; and if the user name part exists, verifying the timestamp part, and verifying the user name through the dynamic password.
Further, in step S202, the verification method for the timestamp part is as follows:
s20201: acquiring the current equipment time, and calculating a current timestamp through an algorithm;
s20202: comparing the time stamp part with the current time stamp, if the time stamp part is the same as the current time stamp part, the login is successful, and after the login is completed, the user can carry out password resetting operation; if not, the login fails.
Further, in step S20201, the current timestamp is calculated by an asymmetric encryption algorithm, so as to satisfy the comparison between the current timestamp and the timestamp portion.
The invention also provides a plasma collector for authority control based on dynamic password, which comprises: the system comprises a central processing unit, a static password authentication module and a dynamic password authentication module which are respectively connected with the central processing unit;
the static password authentication module is used for inputting a static password by a user and authenticating the input static password, and is in communication connection with the dynamic password authentication module;
and the dynamic password verification module is used for inputting a dynamic password by a user, decomposing the dynamic password to produce and acquire a user name part and a time stamp part, and verifying the user name part and the time stamp part respectively.
Further, the static password authentication module includes:
the user name input module is used for inputting a user name by a user and comparing and verifying the user name with a user name database;
the password input module is used for inputting a password by a user and comparing and verifying the password with a password database;
the static password authentication is carried out when a common user, equipment maintenance personnel and a system administrator log in.
Further, the dynamic password at least comprises a user name part, a separation character and a time stamp part, so that the timeliness of the dynamic password is met.
Further, the dynamic password authentication module includes:
the dynamic password input port is used for inputting a dynamic password by a user;
the dynamic seal decomposition module is used for decomposing the dynamic password to generate a user name part and a time stamp part;
and the user name verification module and the time stamp verification module are respectively used for comparing and verifying the user name and the time stamp so that the user can perform password resetting operation after logging in through the dynamic password.
Further, the user name authentication module authenticates the user name part by comparing the user name part with a user name database, so as to authenticate the user name part in the dynamic password.
Furthermore, the timestamp verification module obtains the current equipment time and calculates the current timestamp through an algorithm, and compares the timestamp part with the current timestamp for verification so as to realize verification of the timestamp part in the dynamic password.
The invention has the beneficial effects that:
1. by adopting the dynamic password-based authority control method and the plasma collector thereof, provided by the invention, the authentication of the static password and the dynamic password is organically combined through the effective improvement of the authority control method, so that common users, maintenance personnel and system administrators can be allowed to temporarily log in the system for corresponding operation by inputting a dynamic password with timestamp information, and the dynamic password is invalid in a specified time. Therefore, the confidentiality of the related data of the medical equipment can be ensured to the maximum extent, and the availability of the related data can be improved.
Drawings
Fig. 1 is a flowchart of a method for performing authority control based on dynamic password according to the present invention.
Detailed Description
Reference will now be made in detail to embodiments of the present application, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to the same or similar modules or modules having the same or similar functionality throughout. The embodiments described below with reference to the drawings are exemplary only for the purpose of explaining the present application and are not to be construed as limiting the present application. On the contrary, the embodiments of the application include all changes, modifications and equivalents coming within the spirit and terms of the claims appended hereto.
Example 1
In this embodiment, a method for performing authority control based on a dynamic password is specifically provided, which is mainly used for authority control in a user login authentication phase, and aims to allow a user to temporarily log in a system by inputting a dynamic password with timestamp information to perform a corresponding operation (for example, a password resetting operation), and the dynamic password is invalid within a specified time, as shown in fig. 1, the method for performing authority control based on a dynamic password includes:
s1: the user logs in to carry out static password verification, and if the verification is successful, the login is successful; if the verification fails, the dynamic password verification is automatically carried out, wherein the static password verification comprises the following steps:
s101: a user inputs a user name and a password on a login interface;
s102: after the user name is compared with the user name database, whether the current user name exists in the user name database or not is searched according to the user name input by the user, and if yes, the next step is carried out; if not, ending;
s103: after the password is compared with the password database, whether the password of the corresponding user in the password database is the same as the password of the corresponding user is searched according to the password input by the user, and if the password is the same as the password, the login is successful; for example: when a common user logs in, if a correct common user name and a correct password are input, the common user logs in, and the content related to the authority of the common user is displayed;
when the equipment maintainer logs in, if the correct equipment maintainer user name and password are input, the equipment maintainer logs in, and the content related to the authority of the equipment maintainer is displayed;
when a system administrator logs in, if a correct system administrator user name and a correct system administrator password are input, the system administrator logs in, and the content related to the authority of the system administrator is displayed.
S2: if the static password authentication in S1 fails, for example: when the general user, the equipment maintainer and the system administrator forget the password, the dynamic seal verification is automatically executed, specifically as follows:
s201: inputting a dynamic password by a user, decomposing the dynamic password and acquiring a user name part and a timestamp part; the dynamic password is generated and informed to the user by third-party software, and can be informed to the user in a remote issuing mode. The dynamic password includes at least a username portion, a separation character, and a timestamp portion, such as: the dynamic password is: username + NGL + timestamp, or alternatively: username +98V + timestamp, where "NGL" and "98V" both represent separator characters. The dynamic password has timeliness, the timestamp part of the dynamic password can be accurate to year, month, day, hour, minute and second, and the accuracy of the dynamic password is selected according to different application scenes and service requirements; meanwhile, dynamic passwords are of indefinite length.
In practical application, a timestamp part is arranged after the character is separated in the dynamic password, and a user name encryption part is arranged before the character is separated in the dynamic password; and performing OR operation on the user name encryption part and the time stamp part to obtain the user name part.
S202: respectively verifying the user name part and the timestamp part, and if both parts are successfully verified, the login is successful; otherwise, the login fails. In practical application, under the condition that a common user forgets a password, if a correct common user name and a dynamic password with a timestamp are input, the common user can log in, and then the password can be reset; under the condition that the equipment maintainer forgets the password, if the correct equipment maintainer username and the dynamic password with the timestamp are input, the equipment maintainer can log in, and then the password resetting operation can be carried out; under the condition that a system administrator forgets a password, if a correct system administrator user name and a dynamic password with a time stamp are input, the login of the system administrator can be completed, and then the password resetting operation can be carried out.
The verification method for the user name part comprises the following steps: the user name part is verified by comparing with a user name database, namely whether the current user name part exists in the user name database is searched, and if the current user name part does not exist in the user name database, login is failed; if the username portion exists, then the timestamp portion is verified.
The verification method for the time stamp part is as follows:
s20201: acquiring current equipment time, and calculating a current timestamp through an asymmetric encryption algorithm;
s20202: comparing the timestamp part with the current timestamp, and if the timestamp part is the same as the current timestamp part, successfully logging in; if not, the login fails.
Based on the above, the control of the authority is realized through the static password authentication and the dynamic password authentication, and the login authentication of the user is completed.
Example 2
Based on the method for performing authority control based on dynamic password in embodiment 1, in this embodiment, a plasma collection machine for performing authority control based on dynamic password is provided, and the plasma collection machine includes: the system comprises a central processing unit, a static password authentication module and a dynamic password authentication module which are respectively connected with the central processing unit.
A part of: and the static password verification module is used for inputting a static password by a user and verifying the input static password, the static password comprises a user name and a password, the static password verification module is in communication connection with the dynamic password verification module, and when the static password verification fails, a signal is transmitted to the dynamic password verification module to start the dynamic password verification module to execute related actions. To ensure the authentication of the static password, the static password authentication module includes:
the user name input module is in communication connection with the user name database and used for inputting a user name by a user, comparing and verifying the user name with the user name stored in the user name database, feeding a verification signal back to the central processing unit, and starting the password input module to work if the verification is successful; if the verification fails, the central processing unit feeds back a signal to the display screen to prompt the user that the login fails.
The password input module is in communication connection with the password database and used for a user to input a password, comparing the password with the password database for verification and feeding back a verification signal to the central processing unit, and if the verification is successful, the central processing unit feeds back a signal to the display screen to prompt the user to log in successfully; if the verification fails, the central processing unit feeds back a signal to the display screen to prompt the user that the login fails.
The other part is as follows: and the dynamic password authentication module is used for inputting a dynamic password by a user, decomposing the dynamic password to produce and acquire a user name part and a time stamp part, and authenticating the user name part and the time stamp part respectively, wherein the dynamic password at least comprises a user name part, separation characters and a time stamp part, and is generated by third-party software. The dynamic password authentication module comprises the following components:
the dynamic password input port is used for inputting a dynamic password by a user, and the dynamic password comprises a timestamp;
the dynamic seal decomposition module is used for decomposing the dynamic password to generate a user name part and a time stamp part;
and the user name verification module and the time stamp verification module are respectively used for comparing and verifying the user name and the time stamp. The user name verification module compares the user name part with a user name database for verification, and if the verification is successful, the timestamp verification module is started to work; if the verification fails, a signal is fed back to the display screen through the central processing unit to prompt the user that the login fails;
the timestamp verification module calculates a current timestamp by acquiring current equipment time and an asymmetric encryption algorithm loaded in the timestamp verification module, compares a timestamp part with the current timestamp for verification, and if the verification is successful (the timestamp part is the same as the current timestamp), the central processing unit feeds back a signal to a display screen to prompt a user to log in successfully; if the verification fails (the timestamp part is different from the current timestamp), the central processing unit feeds back a signal to the display screen to prompt the user that the login fails.
It should be noted that, in the description of the present application, the terms "first", "second", etc. are used for descriptive purposes only and are not to be construed as indicating or implying relative importance. Further, in the description of the present application, the meaning of "a plurality" means at least two unless otherwise specified.
Any process or method descriptions in flow charts or otherwise described herein may be understood as representing modules, segments, or portions of code which include one or more executable instructions for implementing specific logical functions or steps of the process, and the scope of the preferred embodiments of the present application includes other implementations in which functions may be executed out of order from that shown or discussed, including substantially concurrently or in reverse order, depending on the functionality involved, as would be understood by those reasonably skilled in the art of the present application.
It should be understood that portions of the present application may be implemented in hardware, software, firmware, or a combination thereof. In the above embodiments, the various steps or methods may be implemented in software or firmware stored in memory and executed by a suitable instruction execution system. For example, if implemented in hardware, as in another embodiment, any one or combination of the following techniques, which are known in the art, may be used: a discrete logic circuit having a logic gate circuit for implementing a logic function on a data signal, an application specific integrated circuit having an appropriate combinational logic gate circuit, a Programmable Gate Array (PGA), a Field Programmable Gate Array (FPGA), or the like.
It will be understood by those skilled in the art that all or part of the steps carried by the method for implementing the above embodiments may be implemented by hardware related to instructions of a program, which may be stored in a computer readable storage medium, and when the program is executed, the program includes one or a combination of the steps of the method embodiments.
In addition, functional units in the embodiments of the present application may be integrated into one processing module, or each unit may exist alone physically, or two or more units are integrated into one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode. The integrated module, if implemented in the form of a software functional module and sold or used as a stand-alone product, may also be stored in a computer readable storage medium.
The storage medium mentioned above may be a read-only memory, a magnetic or optical disk, etc.
In the description herein, reference to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., means that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the application. In this specification, the schematic representations of the terms used above do not necessarily refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
Although embodiments of the present application have been shown and described above, it is understood that the above embodiments are exemplary and should not be construed as limiting the present application, and that variations, modifications, substitutions and alterations may be made to the above embodiments by those of ordinary skill in the art within the scope of the present application.
Claims (10)
1. A method for controlling authority based on dynamic password is characterized in that the method comprises the following steps:
s1: the user logs in to carry out static password verification, and if the verification is successful, the login is successful; if the verification fails, the dynamic password verification is automatically carried out;
s2: performing dynamic seal verification
S201: inputting a dynamic password by a user, decomposing the dynamic password and acquiring a user name part and a timestamp part;
s202: respectively verifying the user name part and the timestamp part, and if both parts are successfully verified, the login is successful; otherwise, the login fails.
2. The dynamic password-based privilege control method according to claim 1, wherein the static password authentication comprises:
s101: a user inputs a user name and a password on a login interface;
s102: after the user name is compared with the user name database, if the user name exists in the user name database, the next step is carried out; if not, ending;
s103: after the password is compared with the password database, if the password is the same as the password database, the login is successful; if not, the process proceeds to step S2.
3. The method of claim 1, wherein the dynamic password is generated by third-party software and is notified to the user, and the dynamic password comprises at least a user name portion, a separation character, and a timestamp portion.
4. The method for controlling authority based on dynamic password of claim 1, wherein in step S202, the user name part is verified by comparing with the user name database, and if the user name part does not exist, the login fails; if the username portion exists, then the timestamp portion is verified.
5. The method for controlling authority based on dynamic password as claimed in claim 1, wherein in step S202, the verification method for the timestamp part is as follows:
s20201: acquiring current equipment time, and calculating a current timestamp through an asymmetric encryption algorithm;
s20202: comparing the timestamp part with the current timestamp, and if the timestamp part is the same as the current timestamp part, successfully logging in; if not, the login fails.
6. The utility model provides a plasma collection machine based on dynamic password carries out access control which characterized in that, this plasma collection machine includes: the system comprises a central processing unit, a static password authentication module and a dynamic password authentication module which are respectively connected with the central processing unit;
the static password authentication module is used for inputting a static password by a user and authenticating the input static password, and is in communication connection with the dynamic password authentication module;
and the dynamic password verification module is used for inputting a dynamic password by a user, decomposing the dynamic password to produce and acquire a user name part and a time stamp part, and verifying the user name part and the time stamp part respectively.
7. The plasma collection machine for authority control based on dynamic password of claim 6, wherein the static password verification module comprises:
the user name input module is used for inputting a user name by a user and comparing and verifying the user name with a user name database;
and the password input module is used for inputting a password by a user and comparing and verifying the password with the password database.
8. The plasma collection machine for privilege control based on dynamic password of claim 6, wherein the dynamic password comprises at least a username portion, a separation character and a timestamp portion.
9. The plasma collection machine for authority control based on dynamic password of claim 6, wherein the dynamic password verification module comprises:
the dynamic password input port is used for inputting a dynamic password by a user;
the dynamic seal decomposition module is used for decomposing the dynamic password to generate a user name part and a time stamp part;
and the user name verification module and the time stamp verification module are respectively used for comparing and verifying the user name and the time stamp.
10. The plasma collection machine for authority control based on dynamic password of claim 9, wherein the user name verification module verifies the user name by comparing the user name part with a user name database; and the timestamp verification module obtains the current equipment time and calculates the current timestamp through an algorithm, and compares and verifies the timestamp part with the current timestamp.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011110191.9A CN112333154A (en) | 2020-10-16 | 2020-10-16 | Method for controlling authority based on dynamic password and plasma collector thereof |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011110191.9A CN112333154A (en) | 2020-10-16 | 2020-10-16 | Method for controlling authority based on dynamic password and plasma collector thereof |
Publications (1)
Publication Number | Publication Date |
---|---|
CN112333154A true CN112333154A (en) | 2021-02-05 |
Family
ID=74313914
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011110191.9A Pending CN112333154A (en) | 2020-10-16 | 2020-10-16 | Method for controlling authority based on dynamic password and plasma collector thereof |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112333154A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116128492A (en) * | 2023-04-14 | 2023-05-16 | 张家口市宣化金科钻孔机械有限公司 | Method for controlling installment payment of drilling machine |
Citations (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101414905A (en) * | 2007-10-17 | 2009-04-22 | 谢丹 | Various selectivity cipher safety authentication system and method |
CN101582764A (en) * | 2009-04-02 | 2009-11-18 | 北京飞天诚信科技有限公司 | Method and system for identity authentication based on dynamic password |
CN101662364A (en) * | 2009-09-17 | 2010-03-03 | 北京飞天诚信科技有限公司 | Method and system for safe login |
US20100131756A1 (en) * | 2008-11-26 | 2010-05-27 | James Paul Schneider | Username based authentication and key generation |
CN102164141A (en) * | 2011-04-24 | 2011-08-24 | 陈珂 | Method for protecting security of account |
CN102487376A (en) * | 2010-12-01 | 2012-06-06 | 金蝶软件(中国)有限公司 | Enterprise resource planning system login method, device and system |
US20120151566A1 (en) * | 2009-08-26 | 2012-06-14 | Tencent Technology (Shenzhen) Company Limited | Method and device for verifying dynamic password |
US20120210408A1 (en) * | 2009-10-30 | 2012-08-16 | Zhou Lu | Verification method and system thereof |
CN103763105A (en) * | 2014-01-07 | 2014-04-30 | 上海众人网络安全技术有限公司 | Encryption method and device for login of Exchange corporate E-mails |
US20140281498A1 (en) * | 2013-03-14 | 2014-09-18 | Comcast Cable Communications, Llc | Identity authentication using credentials |
CN105072132A (en) * | 2015-08-27 | 2015-11-18 | 宇龙计算机通信科技(深圳)有限公司 | Validation method, validation system and communication device |
CN105338525A (en) * | 2014-05-29 | 2016-02-17 | 广州市动景计算机科技有限公司 | Login access processing method, apparatus and system |
CN107864144A (en) * | 2017-11-20 | 2018-03-30 | 珠海市魅族科技有限公司 | Obtain method and device, computer installation and the storage medium of dynamic password |
CN108183907A (en) * | 2017-12-29 | 2018-06-19 | 浪潮通用软件有限公司 | A kind of authentication method, server and Verification System |
CN108632241A (en) * | 2018-03-07 | 2018-10-09 | 湖南小步科技有限公司 | A kind of multi-application system unified login method and apparatus |
CN109544735A (en) * | 2018-10-24 | 2019-03-29 | 天津大学 | A kind of intelligent cipher lock control system of safety that supporting multi-operation mode |
CN109818738A (en) * | 2018-12-29 | 2019-05-28 | 广东电网有限责任公司 | A kind of terminal safe logging method |
CN109936447A (en) * | 2019-01-31 | 2019-06-25 | 平安科技(深圳)有限公司 | Encryption and authentication method, system and computer equipment based on timestamp |
CN110012011A (en) * | 2019-04-03 | 2019-07-12 | 北京奇安信科技有限公司 | Method, apparatus, computer equipment and the storage medium for preventing malice from logging in |
CN111243133A (en) * | 2020-01-07 | 2020-06-05 | 杭州涂鸦信息技术有限公司 | Bluetooth door lock system based on dynamic password generation and matching and unlocking method |
-
2020
- 2020-10-16 CN CN202011110191.9A patent/CN112333154A/en active Pending
Patent Citations (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101414905A (en) * | 2007-10-17 | 2009-04-22 | 谢丹 | Various selectivity cipher safety authentication system and method |
US20100131756A1 (en) * | 2008-11-26 | 2010-05-27 | James Paul Schneider | Username based authentication and key generation |
CN101582764A (en) * | 2009-04-02 | 2009-11-18 | 北京飞天诚信科技有限公司 | Method and system for identity authentication based on dynamic password |
US20120151566A1 (en) * | 2009-08-26 | 2012-06-14 | Tencent Technology (Shenzhen) Company Limited | Method and device for verifying dynamic password |
CN101662364A (en) * | 2009-09-17 | 2010-03-03 | 北京飞天诚信科技有限公司 | Method and system for safe login |
US20120210408A1 (en) * | 2009-10-30 | 2012-08-16 | Zhou Lu | Verification method and system thereof |
CN102487376A (en) * | 2010-12-01 | 2012-06-06 | 金蝶软件(中国)有限公司 | Enterprise resource planning system login method, device and system |
CN102164141A (en) * | 2011-04-24 | 2011-08-24 | 陈珂 | Method for protecting security of account |
US20140281498A1 (en) * | 2013-03-14 | 2014-09-18 | Comcast Cable Communications, Llc | Identity authentication using credentials |
CN103763105A (en) * | 2014-01-07 | 2014-04-30 | 上海众人网络安全技术有限公司 | Encryption method and device for login of Exchange corporate E-mails |
CN105338525A (en) * | 2014-05-29 | 2016-02-17 | 广州市动景计算机科技有限公司 | Login access processing method, apparatus and system |
CN105072132A (en) * | 2015-08-27 | 2015-11-18 | 宇龙计算机通信科技(深圳)有限公司 | Validation method, validation system and communication device |
CN107864144A (en) * | 2017-11-20 | 2018-03-30 | 珠海市魅族科技有限公司 | Obtain method and device, computer installation and the storage medium of dynamic password |
CN108183907A (en) * | 2017-12-29 | 2018-06-19 | 浪潮通用软件有限公司 | A kind of authentication method, server and Verification System |
CN108632241A (en) * | 2018-03-07 | 2018-10-09 | 湖南小步科技有限公司 | A kind of multi-application system unified login method and apparatus |
CN109544735A (en) * | 2018-10-24 | 2019-03-29 | 天津大学 | A kind of intelligent cipher lock control system of safety that supporting multi-operation mode |
CN109818738A (en) * | 2018-12-29 | 2019-05-28 | 广东电网有限责任公司 | A kind of terminal safe logging method |
CN109936447A (en) * | 2019-01-31 | 2019-06-25 | 平安科技(深圳)有限公司 | Encryption and authentication method, system and computer equipment based on timestamp |
CN110012011A (en) * | 2019-04-03 | 2019-07-12 | 北京奇安信科技有限公司 | Method, apparatus, computer equipment and the storage medium for preventing malice from logging in |
CN111243133A (en) * | 2020-01-07 | 2020-06-05 | 杭州涂鸦信息技术有限公司 | Bluetooth door lock system based on dynamic password generation and matching and unlocking method |
Non-Patent Citations (2)
Title |
---|
王淑婷等: "密码认证专利技术现状与发展趋势分析", 《中国发明与专利》 * |
胡锦玲等: "基于Cookie的Web平台身份认证机制的研究与设计", 《江西科学》 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116128492A (en) * | 2023-04-14 | 2023-05-16 | 张家口市宣化金科钻孔机械有限公司 | Method for controlling installment payment of drilling machine |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9824194B2 (en) | Application security framework | |
CN111082940B (en) | Internet of things equipment control method and device, computing equipment and storage medium | |
CN110957025A (en) | Medical health information safety management system | |
CN106031087B (en) | Method and apparatus for Authentication Client voucher | |
CA2874189C (en) | Cyber security analzer | |
EP2109955B1 (en) | Provisioning of digital identity representations | |
EP2332285B1 (en) | Methods and systems for securely managing virtualization platform | |
CN101277189B (en) | Method and apparatus for accepting a digital identity of a user based on transitive trust among parties | |
US20100325687A1 (en) | Systems and Methods for Custom Device Automatic Password Management | |
US20150288712A1 (en) | Threat modeling and analysis | |
CN106533693B (en) | Access method and device of railway vehicle monitoring and overhauling system | |
CN107871081A (en) | A kind of computer information safe system | |
CN110365684A (en) | Access control method, device and the electronic equipment of application cluster | |
US8683188B2 (en) | Reboot controller to prevent unauthorized reboot | |
EP4109308A1 (en) | Gradual credential disablement | |
Tasali et al. | A flexible authorization architecture for systems of interoperable medical devices | |
JP2006119719A (en) | Computer system and user authentication method | |
CN112333154A (en) | Method for controlling authority based on dynamic password and plasma collector thereof | |
CN110222483A (en) | Data processing method, data processing equipment, terminal and storage medium | |
Carminati et al. | A system for timely and controlled information sharing in emergency situations | |
CN115967581A (en) | Login verification method and device, electronic equipment and storage medium | |
US20210334085A1 (en) | Systems and methods for secure over-the-air updates for cyber-physical systems | |
CN115643081A (en) | Industrial control system authentication method and device and computer equipment | |
US11671415B2 (en) | Application module for creating an assured record of a user interaction | |
CN114022161A (en) | Independent source tracing system, method and device for original recording data of LIMS (laser induced mass spectrometry) system based on block chain and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20211122 Address after: 610041 No. 1888, Huanhu East Road, Eastern New Area, Chengdu, Sichuan (self declaration) Applicant after: Sichuan Tianfu Hunter Life Technology Co.,Ltd. Address before: 610041 704, 7, 1, 1800, Yizhou Avenue, high tech Zone, Chengdu, Sichuan Applicant before: Sichuan jiuba Village Information Technology Co.,Ltd. |
|
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20210205 |