CN112784234A - Supplier management method - Google Patents

Supplier management method Download PDF

Info

Publication number
CN112784234A
CN112784234A CN202110130380.0A CN202110130380A CN112784234A CN 112784234 A CN112784234 A CN 112784234A CN 202110130380 A CN202110130380 A CN 202110130380A CN 112784234 A CN112784234 A CN 112784234A
Authority
CN
China
Prior art keywords
information
preset
data
stored
determining
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110130380.0A
Other languages
Chinese (zh)
Other versions
CN112784234B (en
Inventor
张靓新
汪晶
沈松松
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Yitai Education Technology Co ltd
Original Assignee
Beijing Yitai Education Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Yitai Education Technology Co ltd filed Critical Beijing Yitai Education Technology Co ltd
Priority to CN202110130380.0A priority Critical patent/CN112784234B/en
Publication of CN112784234A publication Critical patent/CN112784234A/en
Application granted granted Critical
Publication of CN112784234B publication Critical patent/CN112784234B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/01Customer relationship services
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
    • Y02P90/30Computing systems specially adapted for manufacturing

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Finance (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention relates to a supplier management method, which comprises the following steps: receiving login information; searching a supplier information database according to the account information to obtain stored password information; judging whether the password information is consistent with the stored password information; when the password information is consistent with the stored password information, receiving input information, and decrypting the input information to obtain decryption parameters; judging whether the decryption parameters are consistent with preset parameters or not; when the decryption parameter is consistent with the preset parameter, identifying the type information of the input information; determining authority information according to the account information, and determining support type information according to the authority information; determining information to be stored according to the type information and the support type information; the information to be stored is input information of which the type information is support type information; analyzing and processing the information to be stored to obtain storage position information; and storing the corresponding input information according to the storage position information.

Description

Supplier management method
Technical Field
The invention relates to the technical field of information, in particular to a supplier management method.
Background
Suppliers are businesses and individuals who supply a variety of desired resources to businesses and their competitors, including providing raw materials, equipment, energy, labor, etc. How their situation can have a great influence on the marketing activities of the enterprise, such as raw material price changes, shortages, etc., all affect the price and delivery date of the enterprise products and thus impair the long-term cooperation and benefits of the enterprise and the customers, so that a relatively comprehensive understanding and thorough analysis of the supplier's situation is necessary.
The information statistical method of the suppliers at the present stage has low efficiency and large tracking difficulty, and the aim of optimizing management is difficult to achieve.
Disclosure of Invention
The invention aims to provide a supplier management method aiming at the defects of the prior art, which can automatically store the supply information of a supplier and simultaneously track and evaluate the supplier to realize the optimized management of the supplier.
To achieve the above object, the present invention provides a supplier management method, including:
receiving login information; the login information comprises account information and password information;
searching a supplier information database according to the account information to obtain stored password information;
judging whether the password information is consistent with the stored password information;
when the password information is consistent with the stored password information, receiving input information, and decrypting the input information to obtain decryption parameters;
judging whether the decryption parameters are consistent with preset parameters or not;
when the decryption parameter is consistent with the preset parameter, identifying the type information of the input information;
determining authority information according to the account information, and determining support type information according to the authority information;
determining information to be stored according to the type information and the support type information; the information to be stored is input information of which the type information is support type information;
analyzing and processing the information to be stored to obtain storage position information;
and storing the corresponding input information according to the storage position information.
Preferably, the application information is received;
scoring according to the application information to obtain scoring data;
judging whether the grading data reach a preset grading threshold value or not;
when the grading data reach a preset grading threshold value, determining grading interval information according to the grading data, and determining authority information according to the grading interval information and the application information;
generating account information according to the application information and the random code;
and establishing an association relation among the application information, the account information and the authority information.
Further preferably, when the score data does not reach the preset score threshold, substandard information is generated and fed back.
Preferably, the analyzing and processing according to the information to be stored to obtain the storage location information specifically includes:
carrying out keyword extraction processing on the input information, and carrying out comparison processing according to an extraction result and a preset keyword;
when the similarity data of the extraction result and the preset keywords reach a preset similarity threshold, carrying out sequencing processing according to the similarity data, and determining the preset keyword corresponding to the highest similarity data as a first keyword;
and determining storage position information according to the first keyword.
Preferably, when both the extraction result and the similarity data of the preset keyword do not reach the preset similarity threshold, a first number of near-meaning results are determined according to the extraction result, and comparison processing is performed according to the near-meaning results and the preset keyword.
Preferably, when the password information is inconsistent with the stored password information, login failure prompt information is generated and fed back.
Preferably, when the decrypted data is inconsistent with the preset data, the safety prompt message is generated.
Further preferably, the number of the safety prompt messages is counted;
and when the number reaches a preset number threshold value, modifying the permission information according to a preset mechanism.
The supplier management method provided by the embodiment of the invention can be used for automatically storing the supply information of the supplier and simultaneously tracking and evaluating the supplier so as to realize the optimized management of the supplier.
Drawings
Fig. 1 is a flowchart of a supplier management method according to an embodiment of the present invention.
Detailed Description
The technical solution of the present invention is further described in detail by the accompanying drawings and embodiments.
The supplier management method provided by the invention can automatically store the supply information of the supplier, and simultaneously can track and evaluate the supplier, thereby realizing the optimized management of the supplier.
Fig. 1 is a flowchart of a supplier management method according to an embodiment of the present invention, and the following describes a technical solution of the present invention in detail with reference to fig. 1.
Step 101, receiving login information;
specifically, the login information includes account information and password information.
Step 102, searching a supplier information database according to the account information to obtain stored password information;
specifically, account information of the supplier is stored in the supplier information database, and each account information corresponds to one stored password information. The stored password information is the correct password information for the account information. The password information is the password information actually input by the vendor and is not necessarily correct.
Step 103, judging whether the password information is consistent with the stored password information;
specifically, when the password information is consistent with the stored password information, the login is successful, and step 104 is executed; and when the password information is inconsistent with the stored password information, the login fails, and step 120 is executed to generate and feed back login failure prompt information.
In the optimized scheme, the number of login failure prompt messages in a preset time period is counted, and when the number of the login failure prompt messages reaches a preset failure threshold value, the account is judged to have risks, and the account is limited to login.
In a further preferred embodiment, the login information includes a device ID. And judging whether the device ID is the device which is successfully logged in before. If the equipment is not successfully logged in before, the risk of stealing the number is judged to exist, and the ID of the equipment logged in this time is added into a blacklist, so that the safety of the account information of the supplier is guaranteed.
Step 104, receiving input information, and decrypting the input information to obtain decryption parameters;
in particular, the input information may be understood as data information uploaded by the supplier or information about the supplied product. In order to ensure data security, the stored data is prevented from being tampered. Each vendor has a set of provisioned public and private keys. And in the process of uploading the input information, encrypting the input information through the public key. And when the supplier management platform receives the input information, the supplier management platform decrypts the input information by using the matched private key.
In a preferred scheme, the public key and the private key which are correspondingly equipped for each account information are time-efficient. And when the time effect is reached, automatically replacing the public key and the private key of each account information. That is, the public key and the private key of each account information are not fixed, but are dynamically changed. The information encryption mode can reduce the probability of decoding the encrypted information, reduce the risk of data tampering and ensure the data security of suppliers.
Step 105, judging whether the decryption parameter is consistent with a preset parameter;
specifically, when the decryption parameter is consistent with the preset parameter, it indicates that the data is not tampered, and step 106 is executed; and when the decrypted data is inconsistent with the preset data, indicating that the data is tampered and risking, executing step 130 and generating safety prompt information.
In a preferred scheme, the number of the safety prompt messages is counted. And when the number reaches a preset number threshold value, modifying the authority information according to a preset mechanism. That is, when input information uploaded by one provider many times has a problem, the corresponding authority of the provider is restricted or degraded until the seal number is processed.
Step 106, identifying the type information of the input information;
specifically, the type information may be understood as a format of the input information, for example, a picture format, a text format.
Step 107, determining authority information according to the account information, and determining support type information according to the authority information;
specifically, to optimize the vendor structure, the rights information of different vendors is different. The number of supported type information of the input information of the supplier with low authority is small. The number of supported type information of the input information of the provider having a high authority is large.
Step 108, determining information to be stored according to the type information and the support type information;
specifically, the information to be stored is input information of which the type information is support type information.
Step 109, analyzing and processing the information to be stored to obtain storage position information;
specifically, keyword extraction processing is performed on the input information, and comparison processing is performed according to an extraction result and a preset keyword. And when the similarity data of the extraction result and the preset keywords reach a preset similarity threshold value, carrying out sequencing processing according to the similarity data, and determining the preset keyword corresponding to the highest similarity data as a first keyword. And determining the storage position information according to the first keyword. And when the extraction result and the similarity data of the preset keywords do not reach the preset similarity threshold, determining a first number of near-meaning results according to the extraction result, and performing comparison processing according to the near-meaning results and the preset keywords. And when the similarity data of the similarity result and the preset keywords reach a preset similarity threshold, carrying out sequencing processing according to the similarity data, and determining the preset keyword corresponding to the highest similarity data as a first keyword. And determining the storage position information according to the first keyword. And when the similarity result and the similarity data of the preset keywords do not reach the preset similarity threshold value, taking the preset position information as the storage position information.
And step 110, storing the corresponding input information according to the storage position information.
Specifically, the storage location information may include information that a server ID, a database ID, a folder ID, and the like may be used to indicate a location.
In a preferred arrangement, application information is received. And carrying out grading processing according to the application information to obtain grading data. And judging whether the grading data reach a preset grading threshold value. And when the grading data reach a preset grading threshold value, determining grading interval information according to the grading data, and determining authority information according to the grading interval information and the application information. And generating account information according to the application information and the random code. And establishing an association relation among the application information, the account information and the authority information. And when the grading data does not reach the preset grading threshold value, generating substandard information and feeding back the substandard information.
The application information includes the name of the supplier, the registration address, the telephone information, the contact information, the property of the enterprise, the valid certificate of the enterprise, the credit code certificate and other enterprise basic information. The grading processing comprises grading the correctness and the authenticity of the application information, and comprehensively grading the corresponding external evaluation, sales data and the like acquired according to the application information.
The generation of the account information according to the application information and the random code may specifically be that a combined code is generated according to the application time, the region of the provider, the type and other information and according to a set rule, and then the account information is generated according to the combined code and the random code. The account information can quickly read the information of the supplier, and is more convenient compared with the traditional account information which is only generated by random coding or sequential coding.
In another preferred embodiment, order placing information of the user is received, and the order placing information includes account information of the supplier. And counting the sales information and the after-sales evaluation information of the suppliers in a preset counting time period. And tracking and scoring the suppliers according to the sales information and the after-sale evaluation information to obtain stage scoring data. And modifying the authority information of the supplier according to the stage grading data to achieve the aim of dynamically tracking and evaluating the supplier.
The supplier management method of the invention automatically stores the supply information of the supplier, simultaneously tracks and evaluates the supplier, and realizes the optimized management of the supplier.
Those of skill would further appreciate that the various illustrative components and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, computer software, or combinations of both, and that the various illustrative components and steps have been described above generally in terms of their functionality in order to clearly illustrate this interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
The steps of a method or algorithm described in connection with the embodiments disclosed herein may be embodied in hardware, a software module executed by a processor, or a combination of the two. A software module may reside in Random Access Memory (RAM), memory, Read Only Memory (ROM), electrically programmable ROM, electrically erasable programmable ROM, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art.
The above-mentioned embodiments are intended to illustrate the objects, technical solutions and advantages of the present invention in further detail, and it should be understood that the above-mentioned embodiments are merely exemplary embodiments of the present invention, and are not intended to limit the scope of the present invention, and any modifications, equivalent substitutions, improvements and the like made within the spirit and principle of the present invention should be included in the scope of the present invention.

Claims (8)

1. A supplier management method, characterized in that the supplier management method comprises:
receiving login information; the login information comprises account information and password information;
searching a supplier information database according to the account information to obtain stored password information;
judging whether the password information is consistent with the stored password information;
when the password information is consistent with the stored password information, receiving input information, and decrypting the input information to obtain decryption parameters;
judging whether the decryption parameters are consistent with preset parameters or not;
when the decryption parameter is consistent with the preset parameter, identifying the type information of the input information;
determining authority information according to the account information, and determining support type information according to the authority information;
determining information to be stored according to the type information and the support type information; the information to be stored is input information of which the type information is support type information;
analyzing and processing the information to be stored to obtain storage position information;
and storing the corresponding input information according to the storage position information.
2. The supplier management method according to claim 1, further comprising:
receiving application information;
scoring according to the application information to obtain scoring data;
judging whether the grading data reach a preset grading threshold value or not;
when the grading data reach a preset grading threshold value, determining grading interval information according to the grading data, and determining authority information according to the grading interval information and the application information;
generating account information according to the application information and the random code;
and establishing an association relation among the application information, the account information and the authority information.
3. The supplier management method according to claim 2, further comprising:
and when the grading data does not reach the preset grading threshold value, generating substandard information and feeding back the substandard information.
4. The supplier management method according to claim 1, wherein the analyzing according to the information to be stored to obtain the storage location information specifically comprises:
carrying out keyword extraction processing on the input information, and carrying out comparison processing according to an extraction result and a preset keyword;
when the similarity data of the extraction result and the preset keywords reach a preset similarity threshold, carrying out sequencing processing according to the similarity data, and determining the preset keyword corresponding to the highest similarity data as a first keyword;
and determining storage position information according to the first keyword.
5. The supplier management method according to claim 4, further comprising:
and when the extraction result and the similarity data of the preset keywords do not reach a preset similarity threshold, determining a first number of near-meaning results according to the extraction result, and performing comparison processing according to the near-meaning results and the preset keywords.
6. The supplier management method according to claim 1, further comprising:
and when the password information is inconsistent with the stored password information, generating login failure prompt information and feeding back the login failure prompt information.
7. The supplier management method according to claim 1, further comprising:
and when the decrypted data is inconsistent with the preset data, generating safety prompt information.
8. The supplier management method according to claim 7, further comprising:
counting the number of the safety prompt messages;
and when the number reaches a preset number threshold value, modifying the permission information according to a preset mechanism.
CN202110130380.0A 2021-01-29 2021-01-29 Supplier management method Active CN112784234B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110130380.0A CN112784234B (en) 2021-01-29 2021-01-29 Supplier management method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110130380.0A CN112784234B (en) 2021-01-29 2021-01-29 Supplier management method

Publications (2)

Publication Number Publication Date
CN112784234A true CN112784234A (en) 2021-05-11
CN112784234B CN112784234B (en) 2023-08-04

Family

ID=75759997

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110130380.0A Active CN112784234B (en) 2021-01-29 2021-01-29 Supplier management method

Country Status (1)

Country Link
CN (1) CN112784234B (en)

Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2004013213A (en) * 2002-06-03 2004-01-15 Mediaselect Inc Logical directory constituting method, logical tree display method, logical tree display condition setting method, and information processor
CN1691025A (en) * 2004-04-29 2005-11-02 鸿富锦精密工业(深圳)有限公司 Management system and method for scrutiny of supplier achievement
US20060143074A1 (en) * 2004-12-27 2006-06-29 Tien-Chieh Wu Vender evaluation method
US20070208684A1 (en) * 2006-03-06 2007-09-06 Fuji Xerox Co., Ltd. Information collection support apparatus, method of information collection support, computer readable medium, and computer data signal
CN101882281A (en) * 2009-05-05 2010-11-10 张海潮 Method and system for reserving supplier for event
CN103023875A (en) * 2012-11-21 2013-04-03 北京荣之联科技股份有限公司 Account management system and method
CN103678437A (en) * 2012-08-31 2014-03-26 株式会社日立制作所 Supplier retrieval apparatus and supplier retrieval method
CN106327223A (en) * 2016-11-07 2017-01-11 上海耿沛网络科技有限公司 System for realizing supplier's management of goods
KR20170089163A (en) * 2016-01-26 2017-08-03 서강대학교산학협력단 The method of Semantic information indexing for spatio-temporal database searching system
CN107423314A (en) * 2017-03-22 2017-12-01 深圳市瑞荣创电子科技有限公司 A kind of network group buying information system and its device and information providing method
CN109150903A (en) * 2018-09-25 2019-01-04 平安科技(深圳)有限公司 A kind of account management method, device, storage medium and terminal device
CN109242562A (en) * 2018-08-31 2019-01-18 万翼科技有限公司 Ranking method, device and the storage medium of supplier
CN110084064A (en) * 2019-04-24 2019-08-02 广州知弘科技有限公司 Big data analysis processing method and system based on terminal
CN111788597A (en) * 2018-06-05 2020-10-16 株式会社日立制作所 Transaction management system and transaction management method
CN112187736A (en) * 2020-09-10 2021-01-05 珠海格力电器股份有限公司 Supply chain account login method and device based on mobile terminal

Patent Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2004013213A (en) * 2002-06-03 2004-01-15 Mediaselect Inc Logical directory constituting method, logical tree display method, logical tree display condition setting method, and information processor
CN1691025A (en) * 2004-04-29 2005-11-02 鸿富锦精密工业(深圳)有限公司 Management system and method for scrutiny of supplier achievement
US20060143074A1 (en) * 2004-12-27 2006-06-29 Tien-Chieh Wu Vender evaluation method
US20070208684A1 (en) * 2006-03-06 2007-09-06 Fuji Xerox Co., Ltd. Information collection support apparatus, method of information collection support, computer readable medium, and computer data signal
CN101882281A (en) * 2009-05-05 2010-11-10 张海潮 Method and system for reserving supplier for event
CN103678437A (en) * 2012-08-31 2014-03-26 株式会社日立制作所 Supplier retrieval apparatus and supplier retrieval method
CN103023875A (en) * 2012-11-21 2013-04-03 北京荣之联科技股份有限公司 Account management system and method
KR20170089163A (en) * 2016-01-26 2017-08-03 서강대학교산학협력단 The method of Semantic information indexing for spatio-temporal database searching system
CN106327223A (en) * 2016-11-07 2017-01-11 上海耿沛网络科技有限公司 System for realizing supplier's management of goods
CN107423314A (en) * 2017-03-22 2017-12-01 深圳市瑞荣创电子科技有限公司 A kind of network group buying information system and its device and information providing method
CN111788597A (en) * 2018-06-05 2020-10-16 株式会社日立制作所 Transaction management system and transaction management method
CN109242562A (en) * 2018-08-31 2019-01-18 万翼科技有限公司 Ranking method, device and the storage medium of supplier
CN109150903A (en) * 2018-09-25 2019-01-04 平安科技(深圳)有限公司 A kind of account management method, device, storage medium and terminal device
CN110084064A (en) * 2019-04-24 2019-08-02 广州知弘科技有限公司 Big data analysis processing method and system based on terminal
CN112187736A (en) * 2020-09-10 2021-01-05 珠海格力电器股份有限公司 Supply chain account login method and device based on mobile terminal

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
李宇溪;周福才;徐剑;徐紫枫;: "双服务器模型下支持相关度排序的多关键字密文搜索方案", 计算机研究与发展, no. 10, pages 2149 - 2163 *
王向楠: "基于网络互联的电子制造企业供应商管理系统", 中国优秀硕士学位论文全文数据库信息科技辑, no. 3, pages 138 - 1303 *
黄冠尧;薛开平;洪佩琳;熊继平;: "SSCAN:一种安全的基于CAN的语义网络", 电路与系统学报, no. 02, pages 50 - 56 *

Also Published As

Publication number Publication date
CN112784234B (en) 2023-08-04

Similar Documents

Publication Publication Date Title
US11743041B2 (en) Technologies for private key recovery in distributed ledger systems
US10614244B1 (en) Sensitive data aliasing
CN111080295B (en) Electronic contract processing method and device based on blockchain
US10904014B2 (en) Encryption synchronization method
US9582801B2 (en) Secure communication of payment information to merchants using a verification token
US20080301464A1 (en) Two-dimensional bar code for ID card
CN110602248A (en) Abnormal behavior information identification method, system, device, equipment and medium
US8875280B2 (en) Protecting an electronic device against unathorized hardware use
US20150149775A1 (en) Method and System of Secure Email
AU2010292125A1 (en) Secure communication of payment information to merchants using a verification token
US9432328B2 (en) Method for the certification of electronic mail delivery
CN113140079A (en) Intelligent cabinet opening method, data processing method and device and intelligent cabinet application system
US20060294395A1 (en) Executable software security system
CN112785240A (en) Method and device for processing e-mail, computer readable medium and electronic equipment
CN108900472B (en) Information transmission method and device
Amft et al. " We've Disabled MFA for You": An Evaluation of the Security and Usability of Multi-Factor Authentication Recovery Deployments
CN113836522A (en) Password management method and device of monitoring equipment
CN108234126B (en) System and method for remote account opening
CN105515959A (en) Implementation method of CMS technology-based instant messenger security system
CN112784234B (en) Supplier management method
Al-Sarayreh et al. A trade-off model of software requirements for balancing between security and usability issues
US11496316B1 (en) System and method for identity verification for online dating
US10853898B1 (en) Method and apparatus for controlled messages
CN111582954B (en) False data identification method and device
CN114401117A (en) Account login verification system based on block chain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant