CN112861083A - Electronic commerce security login method based on cloud data - Google Patents

Electronic commerce security login method based on cloud data Download PDF

Info

Publication number
CN112861083A
CN112861083A CN202110108506.4A CN202110108506A CN112861083A CN 112861083 A CN112861083 A CN 112861083A CN 202110108506 A CN202110108506 A CN 202110108506A CN 112861083 A CN112861083 A CN 112861083A
Authority
CN
China
Prior art keywords
data
user
access
account
platform
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110108506.4A
Other languages
Chinese (zh)
Inventor
王萍
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong University Of Finance
Original Assignee
Guangdong University Of Finance
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong University Of Finance filed Critical Guangdong University Of Finance
Priority to CN202110108506.4A priority Critical patent/CN112861083A/en
Publication of CN112861083A publication Critical patent/CN112861083A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/451Execution arrangements for user interfaces
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0601Electronic shopping [e-shopping]

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Computer Security & Cryptography (AREA)
  • Finance (AREA)
  • General Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Computer Hardware Design (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention discloses an electronic commerce secure login method based on cloud data, which comprises the following steps of S1: the detailed steps for building the platform are as follows: the first step is as follows: firstly, a user needs to construct a server bottom layer architecture, a plurality of bottom layer servers are distributed on the top of the server bottom layer architecture, a plurality of bottom layer servers are used for establishing a power provider service platform, and a high-bandwidth data broadband is selected, and the invention has the advantages that: the anti-decoding dongle is arranged at the access authority, so that irrelevant data access is realized on the technical level, the access port is hidden, and a certain access threshold is arranged on a surface layer network, so that the daily data use safety of a user can be ensured.

Description

Electronic commerce security login method based on cloud data
Technical Field
The invention relates to the field of e-commerce secure login, in particular to an e-commerce secure login method based on cloud data.
Background
The electronic commerce refers to the commerce activity which takes the information network technology as a means and takes commodity exchange as a center; the method can also be understood as the transaction activities and related service activities performed in an electronic transaction mode on the Internet, an intranet and a value-added network, and is electronization, networking and informatization of each link of the traditional commercial activities; the commercial behaviors using the internet as a medium all belong to the category of electronic commerce.
The internet data access process used by the existing e-commerce platform is inconvenient for realizing data access processing, the data access effect is poor, the failure of account data is easily caused, the data is lost in the interactive use process, and the data is lost.
Disclosure of Invention
The invention aims to provide an e-commerce secure login method based on cloud data to solve the problems that data access processing is not convenient to achieve in the internet data access process used by the existing e-commerce platform, the data access effect is poor, account data failure is easy to cause, and data is lost in the interactive use process.
In order to achieve the purpose, the invention provides the following technical scheme: a cloud data-based e-commerce secure login method specifically comprises the following steps:
s1: building a platform;
s2: building a surface UI;
s3: constructing a surface data e-commerce access point requires formulating a corresponding webpage access end and a corresponding mobile phone APP access point;
s4: the platform immigration setting basic information immigration establishes the regulation flow of the security management agreement basic registration information:
s5: the most account registration modes are two data receiving modes of a client and a server;
s6: the server side is respectively provided with a storage pool for storing the personal account, so that the data can be accessed simply and conveniently;
s7: illegal account login is limited, and the illegal account is retrieved after personal information is input into the illegal account;
s8: if the illegal operation is realized by logging in an account without sending out a person, loss is reduced as much as possible.
In order to facilitate the construction of the bottom layer operation architecture, the invention adopts a preferable scheme that: s1: the detailed steps for building the platform are as follows: the first step is as follows: firstly, a user needs to construct a server bottom layer framework, a plurality of bottom layer servers are distributed on the top of the server bottom layer framework, a power provider service platform is established through the plurality of bottom layer servers, a high-bandwidth data broadband is selected, then when a database is constructed, the required data platform can be completely constructed at the first time, the self access domain name is registered, two different data interaction platforms are formed, and data communication is established between a surface layer network data interaction platform and a power provider or a client using the surface layer function of the platform;
the second step is that: after the platform of the upper part is built, a manager can build a bottom layer management system based on the service operation platform, the bottom layer e-commerce management system can be based on platform data interaction compiled by the Windows server management system, and a UI display page and a UI display platform of an upper surface layer are built based on the bottom layer data interaction platform, and therefore the use is convenient for users to use, the adopted server has an independent domain name, and a server public network IP bound with the domain name is highlighted on the surface of the Internet, so that a corresponding IP address is easily found along a public network of the surface layer, the attack risk is greatly increased, and therefore, in order to ensure the normal operation of the platform, the situations of poisoning, malicious falsification of the web page, virus propagation chain and the like do not occur, therefore, in the process of building a website, the net cover and the public security network are emphatically needed to realize communication intervention, one is to confirm the credibility of the website, the other is to ensure that the reverse tracing can be realized in time when passive network information attack is received, moreover, the honeypot reverse repair is independently arranged in the server, if the server is attacked and invades the user account, an invader can timely peel off the attack site of the network information after destroying an irrelevant data shell breaking technology, so that attackers are confused to acquire the network IP and realize active defense by combining the network IP and the public security network, and the servers are all provided with high defense systems, communication security certificates are arranged on a UI access platform based on a surface layer network, in-station data intercommunication is established between the UI access platform and three operators, high access data interaction nodes are screened out, the method aims to solve the problem that the data information node of the high-speed access node is still kept under the access of different broadband servers, and further achieves the aim of finally detecting the data.
In order to facilitate the interaction between the data, the interaction is taken as a preferred scheme of the invention: s2: the detailed steps of the establishment of the surface layer UI are as follows: after the bottom layer network data interaction platform is built, the management of follow-up personnel is facilitated, so that the upgrading and BUG patch writing on the surface layer system layer are facilitated, a UI surface layer system platform for simple management data access of background personnel operation needs to be built, the platform can be used as a medium for website system bottom layer upgrading or UI system version upgrading, the built bottom layer system of the system is Linux, the needed system can be connected with the BUG repair conduction for realizing convenient BUG repair for intuitively accessing, the data access connection is realized, the data link is realized, the data access mode is only used as a bottom layer network due to the direct connection with a bottom layer coding database, the access authority is arranged on the surface layer network, and the high-protection access is arranged at a network interface which is also accessed, the access right is provided with a decoding-proof dongle, so that irrelevant data access is realized on the technical level, the access port is hidden to ensure that the access port can enter a threshold on a surface network, so that the daily data use safety of a user can be ensured, a server for storing data by the user cannot be touched in the maintenance process of maintenance personnel, the surface UI data is repaired, and the storage mode of a user database adopts a redundant storage mode, so that the data safety can be ensured, and the data interaction between the user database and the user database adopts a programmed data interaction function, so that the user database still has a replacement and updated version after the upper data is damaged, and the complete loss of the user data is avoided.
In order to make the data access mode, the invention adopts a preferable scheme that: s3: the method for establishing the surface data e-commerce access point needs to establish the corresponding access modes of the webpage access end and the mobile phone APP access point as follows: the method comprises the steps that firstly, after a bottom layer system of the upper side repairs a built E-commerce UI display platform, a domain name of another client side needs to be selected to achieve information data access with the built E-commerce service platform, in the access process, a user needs to conveniently achieve conduction interaction between data, then the user needs to bind the domain name with a built website IP displayed by the UI according to applied domain name information, surface layer network registration is achieved through a conventional search engine, SEO layout is set to extract keywords, website ranking is optimized, the user can occupy the front page of the webpage, typesetting and page turning manufacturing of the surface layer page of the E-commerce service platform are achieved after the optimization of the E-commerce surface layer service platform, and an E-commerce operator is recommended to achieve platform docking.
In order to achieve the purpose of quick access, the invention adopts a preferable scheme that: s4: the regulation flow of the platform docking setting basic information docking and setting up the security management agreement basic registration information is as follows: firstly, the entry requirement of data is that required data information is input into a server which is more conventional than a conventional server such as a hundred-degree or dog search by an official website domain name (address) which needs to be logged in, then a user can enter a built data website, then the user can realize page login through the website address, after a registered button is found, the user can perform malicious emergency registration and batch registration for preventing others, therefore, in order to reduce registration of bad personnel, the data access can be realized by adopting a mobile phone number binding mode in the registration process, the user can perform access connection on the data by using the user in the using process, further, in the using process, the user can select to obtain a verification code after inputting the number to a registration page, at the moment, a system background sends the real-time verification code to the user for one minute by using a verification code server, and the user performs normal operation by using the verification code server The server automatically judges whether the registered person is a real robot or a robot which is too mechanized, and malicious registration is caused.
In order to realize the binding between domain names, as a preferred scheme of the invention: s5: the account number registration mode is mostly a client-side and a server-side two data receiving mode, a client-side user can adopt two modes of computer webpage access and mobile phone mobile terminal APP access to realize internet-type data connection with a static public network domain name, then the user can input numbers to receive verification code information and complete the verification registration of the next step according to the same steps, after the address is set, data interaction processing is realized by internet distribution service, then the user can realize page filled personal information input, at the moment, the user accesses a public security network access application, the user can fill personal real name information into the data to realize the interaction processing of the data, therefore, the user can realize the detection and input of the data and further achieve the setting of the device, and then, the data access processing is realized, so that the data access is realized when the data access processing device is used.
In order to realize stable storage of data, as a preferred embodiment of the present invention: s5: the account registration mode is mostly two data receiving modes of a client and a server, and the interactive connection to the data can be realized conveniently in the process of accessing the information, common information and passwords can be selectively bound during first registration so as to achieve more convenient data interaction of data during use, the data storage pool adopts a redundant storage mode, so that the personal information data is stably stored, the data loss on the account is avoided, if the password of the information account is lost after the password in the personal information login account and the independent account thereof is stored, the mobile phone number bound by the account during registration can be input to retrieve the address, if the IP of the login address of the user is abnormal, the account freezing can be selectively realized, and the freezing is carried out in the same way if the account is normally subjected to violation processing.
In order to realize data interaction, as a preferred scheme of the invention: s6: the server side is respectively provided with a storage pool for storing the personal account, so that the data can be accessed simply and conveniently: firstly, if account illegal operation is caused by personal custody or improper use of the account of the e-commerce platform, the illegal operation brings about no small influence on operators, so that if account login limitation caused by personal operation is not caused, users can remotely access to realize centralized management of all access accounts, through regulation of the illegal account, if a mobile phone number meeting registration in applicant complaint conditions can be logged in the form of a mobile phone verification code, if the mobile phone number meets registration in information complaint, login can be realized in the form of information complaint, after login, a user clicks to forget a password to a complaint item to further receive data, personal information identity card information is input to achieve the purpose of unsealing, and internet access can be smoothly realized.
In order to realize complaint access of the violation account, as a preferred scheme of the invention: s7: the illegal account is limited in login, and the illegal account is retrieved after personal information is input: if the user has unnecessary loss, the user can detect that the user account is normal by means of the data of the background server, and therefore the user can smoothly access the respective data storage pools under supervision, if the user account is abnormal, the user can refuse to log in as violation processing, the user can normally access the user account only after verification or complaint, if the complaint fails, the user can judge that the user account has uncertain influence, the user can perform freezing processing to safely access other accounts, and the honeypot technology can be adopted to realize reverse tracking when the user attacks the server.
Compared with the prior art, the invention has the beneficial effects that:
1) the anti-decoding dongle is arranged at the access authority, so that irrelevant data access is realized on the technical level, the access port is hidden, the access port is set to be a certain access threshold on a surface layer network, the daily data use safety of a user can be ensured, a server for storing data of the user cannot be touched in the maintenance process of maintenance personnel, the surface layer UI data is repaired, the data security of the user database can be ensured by adopting a redundant storage mode, and the data interaction between the user database and the user database adopts a programmed data interaction function, so that the user database still has a replacement and updated version after the upper layer data is damaged, and the complete loss of the user data is avoided.
Drawings
FIG. 1 is a schematic flow chart of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1, the present invention provides a technical solution: a cloud data-based e-commerce secure login method specifically comprises the following steps:
s1: building a platform;
s2: building a surface UI;
s3: constructing a surface data e-commerce access point requires formulating a corresponding webpage access end and a corresponding mobile phone APP access point;
s4: the platform immigration setting basic information immigration establishes the regulation flow of the security management agreement basic registration information:
s5: the most account registration modes are two data receiving modes of a client and a server;
s6: the server side is respectively provided with a storage pool for storing the personal account, so that the data can be accessed simply and conveniently;
s7: illegal account login is limited, and the illegal account is retrieved after personal information is input into the illegal account;
s8: if the illegal operation is realized by logging in an account without sending out a person, loss is reduced as much as possible.
In this embodiment: in the case of S1: the detailed steps of building the platform can be realized according to the following steps: the first step is as follows: firstly, a user needs to construct a server bottom layer framework, a plurality of bottom layer servers are distributed on the top of the server bottom layer framework, a power provider service platform is established through the plurality of bottom layer servers, a high-bandwidth data broadband is selected, then when a database is constructed, the required data platform can be completely constructed at the first time, the self access domain name is registered, two different data interaction platforms are formed, wherein data communication is established between a surface layer network data interaction platform and a power provider or a client using the surface layer function of the platform, and the data receiving and adjusting are realized more conveniently;
the second step is that: after the platform of the upper part is built, a manager can build a bottom layer management system based on the service operation platform, the bottom layer e-commerce management system can be based on platform data interaction compiled by the Windows server management system, and a UI display page and a UI display platform of an upper surface layer are built based on the bottom layer data interaction platform, and therefore the use is convenient for users to use, the adopted server has an independent domain name, and a server public network IP bound with the domain name is highlighted on the surface of the Internet, so that a corresponding IP address is easily found along a public network of the surface layer, the attack risk is greatly increased, and therefore, in order to ensure the normal operation of the platform, the situations of poisoning, malicious falsification of the web page, virus propagation chain and the like do not occur, therefore, in the process of building a website, the net cover and the public security network are emphatically needed to realize communication intervention, one is to confirm the credibility of the website, the other is to ensure that the reverse tracing can be realized in time when passive network information attack is received, moreover, the honeypot reverse repair is independently arranged in the server, if the server is attacked and invades the user account, an invader can timely peel off the attack site of the network information after destroying an irrelevant data shell breaking technology, so that attackers are confused to acquire the network IP and realize active defense by combining the network IP and the public security network, and the servers are all provided with high defense systems, communication security certificates are arranged on a UI access platform based on a surface layer network, in-station data intercommunication is established between the UI access platform and three operators, high access data interaction nodes are screened out, the method aims to solve the problem that the data information node of the high-speed access node is still kept under the access of different broadband servers, and further achieves the aim of finally detecting the data.
In this embodiment: in the case of S2: the detailed steps of the establishment of the surface layer UI are as follows: after the bottom layer network data interaction platform is built, the management of follow-up personnel is facilitated, so that the upgrading and BUG patch writing on the surface layer system layer are facilitated, a UI surface layer system platform for simple management data access of background personnel operation needs to be built, the platform can be used as a medium for website system bottom layer upgrading or UI system version upgrading, the built bottom layer system of the system is Linux, the needed system can be connected with the BUG repair conduction for realizing convenient BUG repair for intuitively accessing, the data access connection is realized, the data link is realized, the data access mode is only used as a bottom layer network due to the direct connection with a bottom layer coding database, the access authority is arranged on the surface layer network, and the high-protection access is arranged at a network interface which is also accessed, the access right is provided with a decoding-proof dongle, so that irrelevant data access is realized on the technical level, the access port is hidden to ensure that the access port can enter a threshold on a surface network, so that the daily data use safety of a user can be ensured, a server for storing data by the user cannot be touched in the maintenance process of maintenance personnel, the surface UI data is repaired, and the storage mode of a user database adopts a redundant storage mode, so that the data safety can be ensured, and the data interaction between the user database and the user database adopts a programmed data interaction function, so that the user database still has a replacement and updated version after the upper data is damaged, and the complete loss of the user data is avoided.
In this embodiment: in the case of S3: the method for establishing the surface data e-commerce access point needs to establish the corresponding access modes of the webpage access end and the mobile phone APP access point as follows: the method comprises the steps that firstly, after a bottom layer system of the upper side repairs a built E-commerce UI display platform, a domain name of another client side needs to be selected to achieve information data access with the built E-commerce service platform, in the access process, a user needs to conveniently achieve conduction interaction between data, then the user needs to bind the domain name with a built website IP displayed by the UI according to applied domain name information, surface layer network registration is achieved through a conventional search engine, SEO layout is set to extract keywords, website ranking is optimized, the user can occupy the front page of the webpage, typesetting and page turning manufacturing of the surface layer page of the E-commerce service platform are achieved after the optimization of the E-commerce surface layer service platform, and an E-commerce operator is recommended to achieve platform docking.
In this embodiment: in the case of S4: the regulation flow of the platform docking setting basic information docking and setting up the security management agreement basic registration information is as follows: firstly, the entry requirement of data is that required data information is input into a server which is more conventional than a conventional server such as a hundred-degree or dog search by an official website domain name (address) which needs to be logged in, then a user can enter a built data website, then the user can realize page login through the website address, after a registered button is found, the user can perform malicious emergency registration and batch registration for preventing others, therefore, in order to reduce registration of bad personnel, the data access can be realized by adopting a mobile phone number binding mode in the registration process, the user can perform access connection on the data by using the user in the using process, further, in the using process, the user can select to obtain a verification code after inputting the number to a registration page, at the moment, a system background sends the real-time verification code to the user for one minute by using a verification code server, and the user performs normal operation by using the verification code server The server automatically judges whether the registered person is a real robot or a robot which is too mechanized, and malicious registration is caused.
In this embodiment: in the case of S5: the account number registration mode is mostly a client-side and a server-side two data receiving mode, a client-side user can adopt two modes of computer webpage access and mobile phone mobile terminal APP access to realize internet-type data connection with a static public network domain name, then the user can input numbers to receive verification code information and complete the verification registration of the next step according to the same steps, after the address is set, data interaction processing is realized by internet distribution service, then the user can realize page filled personal information input, at the moment, the user accesses a public security network access application, the user can fill personal real name information into the data to realize the interaction processing of the data, therefore, the user can realize the detection and input of the data and further achieve the setting of the device, and then, the data access processing is realized, so that the data access is realized when the data access processing device is used.
In this embodiment: in the case of S5: the account registration mode is mostly two data receiving modes of a client and a server, and the interactive connection to the data can be realized conveniently in the process of accessing the information, common information and passwords can be selectively bound during first registration so as to achieve more convenient data interaction of data during use, the data storage pool adopts a redundant storage mode, so that the personal information data is stably stored, the data loss on the account is avoided, if the password of the information account is lost after the password in the personal information login account and the independent account thereof is stored, the mobile phone number bound by the account during registration can be input to retrieve the address, if the IP of the login address of the user is abnormal, the account freezing can be selectively realized, and the freezing is carried out in the same way if the account is normally subjected to violation processing.
In this embodiment: in the case of S6: the server side is respectively provided with a storage pool for storing the personal account, so that the data can be accessed simply and conveniently: firstly, if account illegal operation is caused by personal custody or improper use of the account of the e-commerce platform, the illegal operation brings about no small influence on operators, so that if account login limitation caused by personal operation is not caused, users can remotely access to realize centralized management of all access accounts, through regulation of the illegal account, if a mobile phone number meeting registration in applicant complaint conditions can be logged in the form of a mobile phone verification code, if the mobile phone number meets registration in information complaint, login can be realized in the form of information complaint, after login, a user clicks to forget a password to a complaint item to further receive data, personal information identity card information is input to achieve the purpose of unsealing, and internet access can be smoothly realized.
In this embodiment: in the case of S7: the illegal account is limited in login, and the illegal account is retrieved after personal information is input: if the user has unnecessary loss, the user can detect that the user account is normal by means of the data of the background server, and therefore the user can smoothly access the respective data storage pools under supervision, if the user account is abnormal, the user can refuse to log in as violation processing, the user can normally access the user account only after verification or complaint, if the complaint fails, the user can judge that the user account has uncertain influence, the user can perform freezing processing to safely access other accounts, and the honeypot technology can be adopted to realize reverse tracking when the user attacks the server.
Although the present invention has been described in detail with reference to the foregoing embodiments, it will be apparent to those skilled in the art that various changes, modifications, equivalents, and improvements may be made without departing from the spirit and scope of the invention.

Claims (9)

1. A cloud data-based e-commerce secure login method comprises the following steps: the method is characterized in that: the method comprises the following specific steps:
s1: building a platform;
s2: building a surface UI;
s3: constructing a surface data e-commerce access point requires formulating a corresponding webpage access end and a corresponding mobile phone APP access point;
s4: the platform immigration setting basic information immigration establishes the regulation flow of the security management agreement basic registration information:
s5: the most account registration modes are two data receiving modes of a client and a server;
s6: the server side is respectively provided with a storage pool for storing the personal account, so that the data can be accessed simply and conveniently;
s7: illegal account login is limited, and the illegal account is retrieved after personal information is input into the illegal account;
s8: if the illegal operation is realized by logging in an account without sending out a person, loss is reduced as much as possible.
2. The secure login method for e-commerce based on cloud data of claim 1, wherein: s1: the detailed steps for building the platform are as follows: the first step is as follows: firstly, a user needs to construct a server bottom layer framework, a plurality of bottom layer servers are distributed on the top of the server bottom layer framework, a power provider service platform is established through the plurality of bottom layer servers, a high-bandwidth data broadband is selected, then when a database is constructed, the required data platform can be completely constructed at the first time, the self access domain name is registered, two different data interaction platforms are formed, and data communication is established between a surface layer network data interaction platform and a power provider or a client using the surface layer function of the platform;
the second step is that: after the platform of the upper part is built, a manager can build a bottom layer management system based on the service operation platform, the bottom layer e-commerce management system can be based on platform data interaction compiled by the Windows server management system, and a UI display page and a UI display platform of an upper surface layer are built based on the bottom layer data interaction platform, and therefore the use is convenient for users to use, the adopted server has an independent domain name, and a server public network IP bound with the domain name is highlighted on the surface of the Internet, so that a corresponding IP address is easily found along a public network of the surface layer, the attack risk is greatly increased, and therefore, in order to ensure the normal operation of the platform, the situations of poisoning, malicious falsification of the web page, virus propagation chain and the like do not occur, therefore, in the process of building a website, the net cover and the public security network are emphatically needed to realize communication intervention, one is to confirm the credibility of the website, the other is to ensure that the reverse tracing can be realized in time when passive network information attack is received, moreover, the honeypot reverse repair is independently arranged in the server, if the server is attacked and invades the user account, an invader can timely peel off the attack site of the network information after destroying an irrelevant data shell breaking technology, so that attackers are confused to acquire the network IP and realize active defense by combining the network IP and the public security network, and the servers are all provided with high defense systems, communication security certificates are arranged on a UI access platform based on a surface layer network, in-station data intercommunication is established between the UI access platform and three operators, high access data interaction nodes are screened out, the method aims to solve the problem that the data information node of the high-speed access node is still kept under the access of different broadband servers, and further achieves the aim of finally detecting the data.
3. The secure login method for e-commerce based on cloud data of claim 1, wherein: s2: the detailed steps of the establishment of the surface layer UI are as follows: after the bottom layer network data interaction platform is built, the management of follow-up personnel is facilitated, so that the upgrading and BUG patch writing on the surface layer system layer are facilitated, a UI surface layer system platform for simple management data access of background personnel operation needs to be built, the platform can be used as a medium for website system bottom layer upgrading or UI system version upgrading, the built bottom layer system of the system is Linux, the needed system can be connected with the BUG repair conduction for realizing convenient BUG repair for intuitively accessing, the data access connection is realized, the data link is realized, the data access mode is only used as a bottom layer network due to the direct connection with a bottom layer coding database, the access authority is arranged on the surface layer network, and the high-protection access is arranged at a network interface which is also accessed, the access right is provided with a decoding-proof dongle, so that irrelevant data access is realized on the technical level, the access port is hidden to ensure that the access port can enter a threshold on a surface network, so that the daily data use safety of a user can be ensured, a server for storing data by the user cannot be touched in the maintenance process of maintenance personnel, the surface UI data is repaired, and the storage mode of a user database adopts a redundant storage mode, so that the data safety can be ensured, and the data interaction between the user database and the user database adopts a programmed data interaction function, so that the user database still has a replacement and updated version after the upper data is damaged, and the complete loss of the user data is avoided.
4. The secure login method for e-commerce based on cloud data as claimed in claim 1, wherein: s3: the method for establishing the surface data e-commerce access point needs to establish the corresponding access modes of the webpage access end and the mobile phone APP access point as follows: the method comprises the steps that firstly, after a bottom layer system of the upper side repairs a built E-commerce UI display platform, a domain name of another client side needs to be selected to achieve information data access with the built E-commerce service platform, in the access process, a user needs to conveniently achieve conduction interaction between data, then the user needs to bind the domain name with a built website IP displayed by the UI according to applied domain name information, surface layer network registration is achieved through a conventional search engine, SEO layout is set to extract keywords, website ranking is optimized, the user can occupy the front page of the webpage, typesetting and page turning manufacturing of the surface layer page of the E-commerce service platform are achieved after the optimization of the E-commerce surface layer service platform, and an E-commerce operator is recommended to achieve platform docking.
5. The secure login method for e-commerce based on cloud data of claim 1, wherein: s4: the regulation flow of the platform docking setting basic information docking and setting up the security management agreement basic registration information is as follows: firstly, the entry requirement of data is that required data information is input into a server which is more conventional than a conventional server such as a hundred-degree or dog search by an official website domain name (address) which needs to be logged in, then a user can enter a built data website, then the user can realize page login through the website address, after a registered button is found, the user can perform malicious emergency registration and batch registration for preventing others, therefore, in order to reduce registration of bad personnel, the data access can be realized by adopting a mobile phone number binding mode in the registration process, the user can perform access connection on the data by using the user in the using process, further, in the using process, the user can select to obtain a verification code after inputting the number to a registration page, at the moment, a system background sends the real-time verification code to the user for one minute by using a verification code server, and the user performs normal operation by using the verification code server The server automatically judges whether the registered person is a real robot or a robot which is too mechanized, and malicious registration is caused.
6. The secure login method for e-commerce based on cloud data of claim 1, wherein: s5: the account number registration mode is mostly a client-side and a server-side two data receiving mode, a client-side user can adopt two modes of computer webpage access and mobile phone mobile terminal APP access to realize internet-type data connection with a static public network domain name, then the user can input numbers to receive verification code information and complete the verification registration of the next step according to the same steps, after the address is set, data interaction processing is realized by internet distribution service, then the user can realize page filled personal information input, at the moment, the user accesses a public security network access application, the user can fill personal real name information into the data to realize the interaction processing of the data, therefore, the user can realize the detection and input of the data and further achieve the setting of the device, and then, the data access processing is realized, so that the data access is realized when the data access processing device is used.
7. The secure login method for e-commerce based on cloud data of claim 1, wherein: s5: the account registration mode is mostly two data receiving modes of a client and a server, and the interactive connection to the data can be realized conveniently in the process of accessing the information, common information and passwords can be selectively bound during first registration so as to achieve more convenient data interaction of data during use, the data storage pool adopts a redundant storage mode, so that the personal information data is stably stored, the data loss on the account is avoided, if the password of the information account is lost after the password in the personal information login account and the independent account thereof is stored, the mobile phone number bound by the account during registration can be input to retrieve the address, if the IP of the login address of the user is abnormal, the account freezing can be selectively realized, and the freezing is carried out in the same way if the account is normally subjected to violation processing.
8. The secure login method for e-commerce based on cloud data of claim 1, wherein: s6: the server side is respectively provided with a storage pool for storing the personal account, so that the data can be accessed simply and conveniently: firstly, if account illegal operation is caused by personal custody or improper use of the account of the e-commerce platform, the illegal operation brings about no small influence on operators, so that if account login limitation caused by personal operation is not caused, users can remotely access to realize centralized management of all access accounts, through regulation of the illegal account, if a mobile phone number meeting registration in applicant complaint conditions can be logged in the form of a mobile phone verification code, if the mobile phone number meets registration in information complaint, login can be realized in the form of information complaint, after login, a user clicks to forget a password to a complaint item to further receive data, personal information identity card information is input to achieve the purpose of unsealing, and internet access can be smoothly realized.
9. The secure login method for e-commerce based on cloud data of claim 1, wherein: s7: the illegal account is limited in login, and the illegal account is retrieved after personal information is input: if the user has unnecessary loss, the user can detect that the user account is normal by means of the data of the background server, and therefore the user can smoothly access the respective data storage pools under supervision, if the user account is abnormal, the user can refuse to log in as violation processing, the user can normally access the user account only after verification or complaint, if the complaint fails, the user can judge that the user account has uncertain influence, the user can perform freezing processing to safely access other accounts, and the honeypot technology can be adopted to realize reverse tracking when the user attacks the server.
CN202110108506.4A 2021-01-27 2021-01-27 Electronic commerce security login method based on cloud data Pending CN112861083A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110108506.4A CN112861083A (en) 2021-01-27 2021-01-27 Electronic commerce security login method based on cloud data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110108506.4A CN112861083A (en) 2021-01-27 2021-01-27 Electronic commerce security login method based on cloud data

Publications (1)

Publication Number Publication Date
CN112861083A true CN112861083A (en) 2021-05-28

Family

ID=76009400

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110108506.4A Pending CN112861083A (en) 2021-01-27 2021-01-27 Electronic commerce security login method based on cloud data

Country Status (1)

Country Link
CN (1) CN112861083A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2750347A1 (en) * 2012-12-27 2014-07-02 Koninklijke KPN N.V. Location dependent recovery system
US20160034990A1 (en) * 2014-07-31 2016-02-04 Robert J. Kannair System and method for securely retrieving private data from customer mobile device
CN105491028A (en) * 2015-11-25 2016-04-13 四川诚品电子商务有限公司 Identity authentication method for e-commerce platform account
CN107862570A (en) * 2017-11-03 2018-03-30 上海誉风信息科技有限公司 Realize the popular E-commerce method started an undertaking

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2750347A1 (en) * 2012-12-27 2014-07-02 Koninklijke KPN N.V. Location dependent recovery system
US20160034990A1 (en) * 2014-07-31 2016-02-04 Robert J. Kannair System and method for securely retrieving private data from customer mobile device
CN105491028A (en) * 2015-11-25 2016-04-13 四川诚品电子商务有限公司 Identity authentication method for e-commerce platform account
CN107862570A (en) * 2017-11-03 2018-03-30 上海誉风信息科技有限公司 Realize the popular E-commerce method started an undertaking

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
刘连生等: "基于层次分析法的我国保险电子商务网站评价研究――以太平洋保险为例", 《生产力研究》 *
王愫怡: "电子商务安全管理系统的设计与实现", 《中国优秀硕士学位论文全文数据库 信息科技辑》 *

Similar Documents

Publication Publication Date Title
US11621953B2 (en) Dynamic risk detection and mitigation of compromised customer log-in credentials
US11245718B2 (en) Method and system for tracking fraudulent activity
US9742794B2 (en) Method and apparatus for automating threat model generation and pattern identification
Owen et al. The tor dark net
CN103795745B (en) The monitoring method and system of a kind of intelligent mobile terminal
CN107211016A (en) Secure session is divided and application program parser
CN104253686B (en) Method, equipment and the system that account logs in
CN104718526A (en) Secure mobile framework
CN107579998A (en) Personal data center and digital identification authentication method based on block chain, digital identity and intelligent contract
CN108353079A (en) Detection to the Cyberthreat for application based on cloud
CN109076080A (en) authentication method and system
CN101651541A (en) System and method for authentication of network user
CN106850690A (en) A kind of honey jar building method and system
US20140101730A1 (en) System and method for verifying the age of an internet user
CN107276986B (en) Method, device and system for protecting website through machine learning
CN106899561A (en) A kind of TNC authority control methods and system based on ACL
CN103646198A (en) Method, system and device for locking working region of mobile terminal
CN107104958A (en) Manage the method, private clound and public cloud equipment and storage device of private clound equipment
CN104580197A (en) Code detection method and code detection system
CN1601954B (en) Moving principals across security boundaries without service interruption
CN106254328A (en) A kind of access control method and device
CN107566396A (en) A kind of method based on dynamic password enhancing server VPN protocol securitys
CN112291264A (en) Safety control method and device
CN205510108U (en) A network access system for local lan
CN112861083A (en) Electronic commerce security login method based on cloud data

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination