CN112765629A - Method and system for preventing unauthorized access of education system - Google Patents
Method and system for preventing unauthorized access of education system Download PDFInfo
- Publication number
- CN112765629A CN112765629A CN202110092829.9A CN202110092829A CN112765629A CN 112765629 A CN112765629 A CN 112765629A CN 202110092829 A CN202110092829 A CN 202110092829A CN 112765629 A CN112765629 A CN 112765629A
- Authority
- CN
- China
- Prior art keywords
- module
- authority
- login
- account
- management
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 27
- 238000012795 verification Methods 0.000 claims abstract description 44
- 230000000903 blocking effect Effects 0.000 claims abstract description 7
- 230000004048 modification Effects 0.000 claims description 7
- 238000012986 modification Methods 0.000 claims description 7
- 238000013475 authorization Methods 0.000 abstract description 5
- 230000002265 prevention Effects 0.000 abstract description 2
- 238000011161 development Methods 0.000 description 2
- 230000004075 alteration Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/20—Education
- G06Q50/205—Education administration or guidance
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Business, Economics & Management (AREA)
- Computer Security & Cryptography (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- General Health & Medical Sciences (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Educational Administration (AREA)
- Tourism & Hospitality (AREA)
- Strategic Management (AREA)
- Educational Technology (AREA)
- Bioethics (AREA)
- General Business, Economics & Management (AREA)
- Automation & Control Theory (AREA)
- Primary Health Care (AREA)
- Economics (AREA)
- Marketing (AREA)
- Human Resources & Organizations (AREA)
- Databases & Information Systems (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a method and a system for preventing unauthorized access of an education system, which belong to the technical field of unauthorized access prevention, and particularly relates to a method and a system for preventing unauthorized access of the education system, wherein the method for preventing unauthorized access of the education system comprises login setting, authority setting and time management, the system for preventing unauthorized access of the education system comprises a login management module, an authority management module and a time management module, the login management module comprises a login module, a verification code sending module, a login verification module and an account blocking module, the login module is used for dividing a login window into a manager login window and an access person login window, and the login verification module is used for verifying an account number, a mobile phone number, a verification code and a password, the difficulty of unauthorized operation can be increased by cross-authorization.
Description
Technical Field
The invention relates to the technical field of anti-unauthorized access, in particular to a method and a system for preventing unauthorized access of an education system.
Background
The education system is an integrated education organization form for achieving a certain education purpose and realizing a certain education and teaching function. The education system can be divided into institutional education and non-institutional education as a whole. The teaching aid can be divided into elements such as education purposes, education contents, education methods, education activities, education media, education facilities, education environments, students, teachers and teaching managers, and the elements are independent, mutually connected and mutually interacted to form an organic whole. With the development of the network, the education system also serves as a platform facing vast users, and different management authorities can be granted to different managers for the convenience of management of the education system.
The education system contains a large amount of important data such as personal information, education fund information and the like, and along with the development of the network, lawbreakers use the vulnerability of the network to carry out unauthorized access, thereby stealing or modifying the important data in the education system.
Disclosure of Invention
The invention aims to provide a method and a system for preventing unauthorized access of an education system, so as to solve the problem that the prior education system proposed in the background art lacks prevention on unauthorized access.
In order to achieve the purpose, the invention provides the following technical scheme: a method for preventing unauthorized access of an educational system, the method for preventing unauthorized access of an educational system comprising:
the method comprises the following steps: the method comprises the steps of setting a manager login window and an accessor login window in the education system, accessing public information in the education system only after logging in from the accessor login window, performing access modification on important information in the education system after logging in from the manager login window, logging in from the accessor login window by adopting an account encryption code, logging in from the manager login window by adopting an account, a mobile phone number and a verification code, and when the number of errors of the verification code reaches five times, prohibiting the account from logging in the education system, and classifying managers into low-level authority managers and high-level authority managers according to authority levels of the managers, wherein the number of the accounts and the number of the verification codes are different when logging in the managers with different authority levels;
step two: the method comprises the following steps that authority setting is carried out, a low-level authority manager only has the authority of browsing important data after logging in, the low-level authority manager can browse the important data only once, only when a high-level authority manager authorizes the low-level authority manager, the low-level authority manager can browse the important data in batches, only the high-level authority manager can modify the important data, other high-level authority managers must authorize the high-level authority manager during modification, and the high-level authority manager can modify the important data;
step three: and time management, wherein the visitors can access the education system at any time, the accounts of the low-level authority managers can log in only during working hours, and the accounts of the high-level authority managers can log in at any time.
Preferably, the account number and the mobile phone number of the manager are set in advance, and when the manager logs in the window, the verification code is sent to the mobile phone number only if the account number and the mobile phone number are both correct.
Preferably, the digits of the account and the verification code logged in by the high-level authority management personnel are higher than those of the account and the verification code logged in by the low-level authority management personnel.
Preferably, when logging in from the visitor login window and an account number or a password is wrong, the account number or the password is wrong, and when logging in from the manager login window and the account number, the mobile phone number or the verification code is wrong, the error problem is not displayed.
A system for preventing an educational system from unauthorized access comprises a login management module, a permission management module and a time management module, wherein the login management module comprises a login module, a verification code sending module, a login verification module and an account number blocking module, the login module is responsible for dividing a login window into a manager login window and an accessor login window, the login verification module is responsible for verifying an account number, a mobile phone number, a verification code and a password, the verification code sending module is responsible for sending the verification code, the account number blocking module is responsible for recording the matching error times of the account number, the mobile phone number and the verification code and forbidding the account number with the error times exceeding the specified requirement to continue login, the permission management module comprises an account number management module, a permission distribution module, a permission limitation module and a permission matching module, the account number management module divides the account number into a management account number and an access account number, the authority distribution module is responsible for granting different management authorities to different management accounts, the authority matching module is responsible for linking different management accounts with authorities of the management accounts, the authority limiting module is responsible for limiting authorities of accounts with management authorities, the authority limiting module unlocks the authorities only when the accounts are granted by other accounts with management authorities, the time management module comprises a login time limiting module and an authority time limiting module, the login time limiting module is responsible for limiting time of the login management module, and the authority time limiting module is responsible for limiting time of the authority management module.
Preferably, the login time limiting module includes an account time limiting module and an IP time limiting module, the account time limiting module is responsible for limiting a time period in which the management account can login, and the IP time limiting module is responsible for limiting the login time of the IP of the login account.
Preferably, the IP time limiting module includes an IP memory module and an IP time limiting module, when the IP of the management account login is a common IP, the IP time limiting module does not limit the IP time, when the IP of the management account login is another IP, the IP time limiting module limits the login time, and when the time exceeds a predetermined value, the IP time limiting module prohibits the IP from continuing to login.
Compared with the prior art, the invention has the beneficial effects that:
1) the invention manages the authority by a cross authorization mode, when a certain account is revealed, lawless persons need to authorize other accounts when wanting to perform the unauthorized operation by using the account, and the difficulty of the unauthorized operation can be increased by the cross authorization;
2) the account of the low-level authority management personnel can only log in during the working hours, so that the illegal operation of the low-level authority management personnel on the account during the working hours is avoided, the low-level authority management personnel can only browse important data once, and the illegal operation of the low-level authority management personnel can also be avoided by limiting the authority of the low-level authority management personnel.
Drawings
FIG. 1 is a block diagram of a system according to the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
In the description of the present invention, it is to be understood that the terms "upper", "lower", "front", "rear", "left", "right", "top", "bottom", "inner", "outer", and the like, indicate orientations or positional relationships based on the orientations or positional relationships shown in the drawings, are merely for convenience in describing the present invention and simplifying the description, and do not indicate or imply that the device or element being referred to must have a particular orientation, be constructed and operated in a particular orientation, and thus, should not be construed as limiting the present invention.
In the description of the present invention, it should be noted that, unless otherwise explicitly specified or limited, the terms "mounted," "disposed," "sleeved/connected," "connected," and the like are to be construed broadly, e.g., "connected," which may be fixedly connected, detachably connected, or integrally connected; can be mechanically or electrically connected; they may be connected directly or indirectly through intervening media, or they may be interconnected between two elements. The specific meanings of the above terms in the present invention can be understood in specific cases to those skilled in the art.
Example (b):
referring to fig. 1, the present invention provides a technical solution: a method for preventing unauthorized access of an educational system, the method for preventing unauthorized access of an educational system comprising:
the method comprises the following steps: the method comprises the steps of setting a manager login window and an accessor login window in the education system, accessing public information in the education system only after logging in from the accessor login window, performing access modification on important information in the education system after logging in from the manager login window, logging in from the accessor login window by adopting an account encryption code, logging in from the manager login window by adopting an account, a mobile phone number and a verification code, and when the number of errors of the verification code reaches five times, prohibiting the account from logging in the education system, and classifying managers into low-level authority managers and high-level authority managers according to authority levels of the managers, wherein the number of the accounts and the number of the verification codes are different when logging in the managers with different authority levels;
step two: the method comprises the following steps that authority setting is carried out, a low-level authority manager only has the authority of browsing important data after logging in, the low-level authority manager can browse the important data only once, only when a high-level authority manager authorizes the low-level authority manager, the low-level authority manager can browse the important data in batches, only the high-level authority manager can modify the important data, other high-level authority managers must authorize the high-level authority manager during modification, and the high-level authority manager can modify the important data;
step three: and time management, wherein the visitors can access the education system at any time, the accounts of the low-level authority managers can log in only during working hours, and the accounts of the high-level authority managers can log in at any time.
The account number and the mobile phone number of the manager are set in advance, and when the manager logs in the window, the verification code is sent to the mobile phone number only if the account number and the mobile phone number are both correct.
The digits of the account number and the identifying code logged in by the high-level authority management personnel are higher than those of the account number and the identifying code logged in by the low-level authority management personnel.
When logging in from the visitor logging-in window and the account number or the password is wrong, the display shows that the account number or the password is wrong, and when logging in from the manager logging-in window and the account number, the mobile phone number or the verification code is wrong, the error problem is not displayed.
A system for preventing an educational system from unauthorized access comprises a login management module, a permission management module and a time management module, wherein the login management module comprises a login module, a verification code sending module, a login verification module and an account number blocking module, the login module is used for dividing a login window into a manager login window and an accessor login window, the login verification module is used for verifying an account number, a mobile phone number, a verification code and a password, the verification code sending module is used for sending the verification code, the account number blocking module is used for recording the matching error times of the account number, the mobile phone number and the verification code and forbidding the account number with the error time exceeding the specified requirement to continuously login, the permission management module comprises an account number management module, a permission distribution module, a permission limiting module and a permission matching module, the account number management module is used for dividing the account number into a management account number and an access, the method comprises the steps that access accounts are automatically issued according to information of application personnel, management accounts are divided into low-level authority management accounts and high-level authority management accounts, authorization of high-level authority management accounts is required when the low-level authority management accounts are issued, when the number of the high-level authority management accounts is larger than 2, authorization of 2 high-level authority management accounts is required when the high-level authority management accounts are issued, an authority distribution module is responsible for granting different management authorities to different management accounts, an authority matching module is responsible for linking different management accounts with the authority of the management accounts, an authority limiting module is responsible for limiting the authority of the accounts with the management authorities, and the authority limiting module unlocks the authority only when the accounts are granted with other accounts with the management authorities, for example, the low-level authority management personnel can only browse important data once, only when a high-level authority manager authorizes a low-level authority manager, the low-level authority manager can browse important data in batches, the time management module comprises a login time limiting module and an authority time limiting module, the login time limiting module is responsible for limiting the time of the login management module, the authority time limiting module is responsible for limiting the time of the authority management module, and the authority distributing module and the authority limiting module can be used only in working hours, so that the unauthorized persons can be prevented from using system leaks in non-working hours to perform unauthorized operation.
The login time limiting module comprises an account time limiting module and an IP time limiting module, the account time limiting module is responsible for limiting the login time period of the management account, namely, a low-level authority manager can log in the account only in working hours, the IP time limiting module is responsible for limiting the login time of the IP of the login account, and the IP can not log in the account any more when the time exceeds the set time.
The IP time limiting module comprises an IP memory module and an IP time limiting module, when the IP when the management account logs in is a common IP, the IP time limiting module does not limit, when the IP when the management account logs in is other IPs, the IP time limiting module limits the time used for logging in, when the time exceeds a specified value, the IP time limiting module prohibits the IP from continuing logging in, and through time limitation, the vulnerability of a system is prevented from being impacted by lawless persons by using data streams.
While there have been shown and described the fundamental principles and essential features of the invention and advantages thereof, it will be apparent to those skilled in the art that the invention is not limited to the details of the foregoing exemplary embodiments, but is capable of other specific forms without departing from the spirit or essential characteristics thereof; the present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the invention being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein, and any reference signs in the claims are not intended to be construed as limiting the claim concerned.
Although embodiments of the present invention have been shown and described, it will be appreciated by those skilled in the art that changes, modifications, substitutions and alterations can be made in these embodiments without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.
Claims (7)
1. A method for providing anti-unauthorized access to an educational system, comprising: the method for preventing unauthorized access of an educational system comprises the following steps:
the method comprises the following steps: the method comprises the steps of setting a manager login window and an accessor login window in the education system, accessing public information in the education system only after logging in from the accessor login window, performing access modification on important information in the education system after logging in from the manager login window, logging in from the accessor login window by adopting an account encryption code, logging in from the manager login window by adopting an account, a mobile phone number and a verification code, and when the number of errors of the verification code reaches five times, prohibiting the account from logging in the education system, and classifying managers into low-level authority managers and high-level authority managers according to authority levels of the managers, wherein the number of the accounts and the number of the verification codes are different when logging in the managers with different authority levels;
step two: the method comprises the following steps that authority setting is carried out, a low-level authority manager only has the authority of browsing important data after logging in, the low-level authority manager can browse the important data only once, only when a high-level authority manager authorizes the low-level authority manager, the low-level authority manager can browse the important data in batches, only the high-level authority manager can modify the important data, other high-level authority managers must authorize the high-level authority manager during modification, and the high-level authority manager can modify the important data;
step three: and time management, wherein the visitors can access the education system at any time, the accounts of the low-level authority managers can log in only during working hours, and the accounts of the high-level authority managers can log in at any time.
2. A method for providing anti-unauthorized access to an educational system as recited in claim 1, wherein: the account number and the mobile phone number of the manager are set in advance, and when the manager logs in the window, the verification code is sent to the mobile phone number only if the account number and the mobile phone number are both correct.
3. A method for providing anti-unauthorized access to an educational system as recited in claim 1, wherein: the digits of the account and the verification code logged by the high-level authority management personnel are higher than those of the account and the verification code logged by the low-level authority management personnel.
4. A method for providing anti-unauthorized access to an educational system as recited in claim 1, wherein: when logging in from the visitor login window and an account number or a password is wrong, the account number or the password is wrong, and when logging in from the manager login window and the account number, the mobile phone number or the verification code is wrong, the error problem is not displayed.
5. A system for preventing unauthorized access of an educational system, comprising a login management module, a right management module and a time management module, characterized in that: the login management module comprises a login module, a verification code sending module, a login verification module and an account number blocking module, wherein the login module is responsible for dividing a login window into a manager login window and an access person login window, the login verification module is responsible for verifying an account number, a mobile phone number, a verification code and a password, the verification code sending module is responsible for sending the verification code, the account number blocking module is responsible for recording the matching error times of the account number, the mobile phone number and the verification code and forbidding the account number with the error times exceeding the specified requirement to continue login, the authority management module comprises an account number management module, an authority distribution module, an authority limit module and an authority matching module, the account number management module divides the account number into a management account number and an access account number, and the authority distribution module is responsible for granting different management authorities to different management account numbers, the authority matching module is responsible for linking different management accounts with the authority of the management account, the authority limiting module is responsible for limiting the authority of the account with the management authority, the authority limiting module unlocks the authority only when the account is authorized by other accounts with the management authority, the time management module comprises a login time limiting module and an authority time limiting module, the login time limiting module is responsible for limiting the time of the login management module, and the authority time limiting module is responsible for limiting the time of the authority management module.
6. A system for providing anti-unauthorized access to an educational system as recited in claim 5, wherein: the login time limiting module comprises an account time limiting module and an IP time limiting module, the account time limiting module is responsible for limiting the login time period of the management account, and the IP time limiting module is responsible for limiting the login time of the IP of the login account.
7. A system for providing anti-unauthorized access to an educational system as recited in claim 6, wherein: the IP time limiting module comprises an IP memory module and an IP time limiting module, when the IP when the management account logs in is a common IP, the IP time limiting module does not limit, when the IP when the management account logs in is other IPs, the IP time limiting module limits the time used for logging in, and when the time exceeds a specified value, the IP time limiting module prohibits the IP from continuing logging in.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110092829.9A CN112765629A (en) | 2021-01-25 | 2021-01-25 | Method and system for preventing unauthorized access of education system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110092829.9A CN112765629A (en) | 2021-01-25 | 2021-01-25 | Method and system for preventing unauthorized access of education system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN112765629A true CN112765629A (en) | 2021-05-07 |
Family
ID=75706948
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110092829.9A Pending CN112765629A (en) | 2021-01-25 | 2021-01-25 | Method and system for preventing unauthorized access of education system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112765629A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114697084A (en) * | 2022-03-14 | 2022-07-01 | 浙江大豪科技有限公司 | Data access method for sewing equipment |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120150912A1 (en) * | 2010-12-09 | 2012-06-14 | International Business Machines Corporation | Hierarchical multi-tenancy management of system resources in resource groups |
CN105787317A (en) * | 2016-03-23 | 2016-07-20 | 中国电力科学研究院 | Permission control method based on multi-layer hierarchy system |
CN106529130A (en) * | 2016-10-24 | 2017-03-22 | 深圳市前海安测信息技术有限公司 | Electronic medical records encrypting and checking system and method in medical information system |
CN108009407A (en) * | 2017-11-29 | 2018-05-08 | 华迪计算机集团有限公司 | A kind of method and system that differentiated control is carried out to system user authority |
CN108965294A (en) * | 2018-07-16 | 2018-12-07 | 安徽信尔联信息科技有限公司 | A kind of user name and cipher protection system |
CN110401655A (en) * | 2019-07-23 | 2019-11-01 | 宿州星尘网络科技有限公司 | Access control right management system based on user and role |
CN110598388A (en) * | 2019-08-29 | 2019-12-20 | 达疆网络科技(上海)有限公司 | Method for controlling login access of authority system |
CN110891069A (en) * | 2019-12-24 | 2020-03-17 | 北京同有飞骥科技股份有限公司 | Password verification method and system based on user login |
CN111079127A (en) * | 2019-11-20 | 2020-04-28 | 武汉达梦数据技术有限公司 | User grading authorization management method and device of information system |
-
2021
- 2021-01-25 CN CN202110092829.9A patent/CN112765629A/en active Pending
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120150912A1 (en) * | 2010-12-09 | 2012-06-14 | International Business Machines Corporation | Hierarchical multi-tenancy management of system resources in resource groups |
CN105787317A (en) * | 2016-03-23 | 2016-07-20 | 中国电力科学研究院 | Permission control method based on multi-layer hierarchy system |
CN106529130A (en) * | 2016-10-24 | 2017-03-22 | 深圳市前海安测信息技术有限公司 | Electronic medical records encrypting and checking system and method in medical information system |
CN108009407A (en) * | 2017-11-29 | 2018-05-08 | 华迪计算机集团有限公司 | A kind of method and system that differentiated control is carried out to system user authority |
CN108965294A (en) * | 2018-07-16 | 2018-12-07 | 安徽信尔联信息科技有限公司 | A kind of user name and cipher protection system |
CN110401655A (en) * | 2019-07-23 | 2019-11-01 | 宿州星尘网络科技有限公司 | Access control right management system based on user and role |
CN110598388A (en) * | 2019-08-29 | 2019-12-20 | 达疆网络科技(上海)有限公司 | Method for controlling login access of authority system |
CN111079127A (en) * | 2019-11-20 | 2020-04-28 | 武汉达梦数据技术有限公司 | User grading authorization management method and device of information system |
CN110891069A (en) * | 2019-12-24 | 2020-03-17 | 北京同有飞骥科技股份有限公司 | Password verification method and system based on user login |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114697084A (en) * | 2022-03-14 | 2022-07-01 | 浙江大豪科技有限公司 | Data access method for sewing equipment |
CN114697084B (en) * | 2022-03-14 | 2024-03-26 | 浙江大豪科技有限公司 | Sewing equipment data access method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Stewart et al. | CISSP: Certified information systems security professional study guide | |
Krutz et al. | The CISSP Prep Guide: Mastering the ten domains of computer security | |
CN104104652B (en) | A kind of man-machine recognition methods, network service cut-in method and corresponding equipment | |
US7672906B2 (en) | Randomly generated color grid used to ensure multi-factor authentication | |
Andress | Foundations of information security: a straightforward introduction | |
US20060059365A1 (en) | Facility security with optical cards | |
CN110417820A (en) | Processing method, device and the readable storage medium storing program for executing of single-node login system | |
CN116542637B (en) | Government platform safety control method based on computer | |
CN112734248A (en) | Real estate intelligent management system | |
CN112765629A (en) | Method and system for preventing unauthorized access of education system | |
Al-Sherideh et al. | Assessing the Impact and Effectiveness of Cybersecurity Measures in e-Learning on Students and Educators: A Case Study | |
Bishop | Overview of red team reports | |
Kitheka | Information security management systems in public universities in Kenya: A gap analysis between common Practices and industry best practices | |
Romansky et al. | Technological organization of the access management to information resources in a combined e-learning environment | |
Panek | Security fundamentals | |
Veerapaneni et al. | A systematic study of asset management using hybrid cyber security maturity model | |
Alliance | Using smart cards for secure physical access | |
Ramsbrock et al. | Magnetic swipe card system security | |
Lebea | Context-driven authentication in physical access control environments | |
Smith et al. | Integrating physical and computer access control systems | |
Agrawal et al. | The MIT ID Card System: Analysis and Recommendations | |
CN116541819A (en) | Dual-factor traceable identity verification method and system | |
CN105468939A (en) | Safety protection system of mobile terminal | |
Alexander | Information security: a manager's guide to thwarting data thieves and hackers | |
Sagers et al. | Information Technology Security Fundamentals |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20210507 |