CN113627208B - Code scanning login early warning method and device, computer equipment and storage medium - Google Patents

Code scanning login early warning method and device, computer equipment and storage medium Download PDF

Info

Publication number
CN113627208B
CN113627208B CN202110943936.8A CN202110943936A CN113627208B CN 113627208 B CN113627208 B CN 113627208B CN 202110943936 A CN202110943936 A CN 202110943936A CN 113627208 B CN113627208 B CN 113627208B
Authority
CN
China
Prior art keywords
code scanning
verification
early warning
login
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110943936.8A
Other languages
Chinese (zh)
Other versions
CN113627208A (en
Inventor
朱传炳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Source Hui Information Polytron Technologies Inc
Original Assignee
Shanghai Source Hui Information Polytron Technologies Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Source Hui Information Polytron Technologies Inc filed Critical Shanghai Source Hui Information Polytron Technologies Inc
Priority to CN202110943936.8A priority Critical patent/CN113627208B/en
Publication of CN113627208A publication Critical patent/CN113627208A/en
Application granted granted Critical
Publication of CN113627208B publication Critical patent/CN113627208B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/14Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
    • G06K7/1404Methods for optical code recognition
    • G06K7/1408Methods for optical code recognition the method being specifically adapted for the type of code
    • G06K7/14172D bar codes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Electromagnetism (AREA)
  • Toxicology (AREA)
  • Artificial Intelligence (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Bioethics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention relates to the technical field of computers, in particular to a code scanning login early warning method, a device, computer equipment and a storage medium, wherein the code scanning login early warning method comprises the following steps: receiving a login request and carrying out identity security verification; the identity security verification is passed, and the code scanning information verification is carried out; determining the security level according to the identity security verification and the code scanning verification result; and rejecting or accepting the access of the user according to the security level. The code scanning login early warning method provided by the embodiment of the invention carries out identity security verification and code scanning information verification on the user, so that the security level of the user is determined, corresponding operation is carried out according to the determined security level to accept or accept the access of the user.

Description

Code scanning login early warning method and device, computer equipment and storage medium
Technical Field
The present invention relates to the field of computer technologies, and in particular, to a code scanning login early warning method, a code scanning login early warning device, a computer device, and a storage medium.
Background
Two-dimensional codes, also known as two-dimensional bar codes, have been widely used in mobile devices in recent years, and are a way of expressing information by arranging specific geometric shapes in a planar area according to a certain rule. The two-dimensional code has low threshold, is convenient to generate and recognize, and well combines the display and recognition functions of the mobile equipment.
The two-dimensional code has wide application and the fundamental function is to provide a data entry through which equipment can quickly access a specific object. In various commercial popularization and promotion activities, the two-dimensional code is widely used. In this case, the supervision of the user accessing through the two-dimensional code encounters a problem, and because the portal is open, the system is difficult to identify the user, and there is no effective treatment means for the problems of commercial resource loss, influence on the accuracy of statistical data, and the like caused by repeated login.
Therefore, the prior art is not in place for safety control of two-dimension code scanning login, and needs improvement.
Disclosure of Invention
Based on the foregoing, it is necessary to provide a code scanning login early warning method, a code scanning login early warning device, a computer device and a storage medium.
The embodiment of the invention is realized in such a way that the code scanning login early warning method comprises the following steps:
receiving a login request and carrying out identity security verification;
the identity security verification is passed, and the code scanning information verification is carried out;
determining the security level according to the identity security verification and the code scanning verification result;
and rejecting or accepting the access of the user according to the security level.
In one embodiment, the invention provides a code scanning login early warning device, which comprises:
the identity verification module is used for receiving a login request and carrying out identity security verification;
the code scanning verification module is used for carrying out code scanning information verification after the identity security verification is passed;
the security level determining module is used for determining the security level according to the identity security verification and the code scanning verification result;
and the operation module is used for rejecting or accepting the access of the user according to the security level.
In one embodiment, the invention provides a computer device, which comprises a memory and a processor, wherein the memory stores a computer program, and the computer program when executed by the processor causes the processor to execute the steps of the code scanning login early warning method.
In one embodiment, the present invention provides a computer readable storage medium, where a computer program is stored on the computer readable storage medium, where the computer program when executed by a processor causes the processor to execute the steps of the code scanning login early warning method described above.
The code scanning login early warning method provided by the embodiment of the invention carries out identity security verification and code scanning information verification on the user, so that the security level of the user is determined, corresponding operation is carried out according to the determined security level to accept or accept the access of the user.
Drawings
FIG. 1 is an application environment diagram of a code scanning login early warning method provided by an embodiment of the invention;
FIG. 2 is a flow chart of a code scanning login early warning method provided by an embodiment of the invention;
FIG. 3 is a flow chart of identity security verification according to one embodiment of the present invention;
FIG. 4 is a flow chart of authentication according to another embodiment of the present invention;
FIG. 5 is a block diagram illustrating a code scanning login early warning device according to an embodiment of the present invention;
fig. 6 is a block diagram illustrating an internal structure of a computer device according to an embodiment of the present invention.
Detailed Description
The present invention will be described in further detail with reference to the drawings and examples, in order to make the objects, technical solutions and advantages of the present invention more apparent. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the invention.
It will be understood that the terms "first," "second," and the like, as used herein, may be used to describe various elements, but these elements are not limited by these terms unless otherwise specified. These terms are only used to distinguish one element from another element. For example, a first xx script may be referred to as a second xx script, and similarly, a second xx script may be referred to as a first xx script, without departing from the scope of this disclosure.
Fig. 1 is an application environment diagram of a code scanning login early warning method provided in an embodiment, as shown in fig. 1, in the application environment, the code scanning login early warning method includes a code scanning terminal 110 and a server 120.
The server 120 may be an independent physical server or terminal, or may be a server cluster formed by a plurality of physical servers, or may be a cloud server that provides basic cloud computing services such as a cloud server, a cloud database, cloud storage, and CDN. In the embodiment of the invention, the server 120 can perform safety supervision on the code scanning terminal which requests to log in through code scanning by running the code scanning login early warning method provided by the embodiment of the invention, thereby effectively preventing irregular operations such as bill swiping, frequent user IP replacement and the like.
The code scanning terminal 110 may be, but is not limited to, a smart phone, a tablet computer, a notebook computer, a desktop computer, a smart speaker, a smart watch, etc.; preferably a mobile device. The code scanning terminal is generally provided with a camera, and two-dimensional codes can be acquired and resolved to obtain a data access port. The code scanning terminal 110 and the server 120 may be connected through a network, which is not limited in this disclosure.
As shown in fig. 2, in one embodiment, a code scanning login early warning method is provided, and this embodiment is mainly illustrated by applying the method to the above-mentioned or server 120 in fig. 1. The method specifically comprises the following steps:
step S202, receiving a login request and carrying out identity security verification.
In the embodiment of the invention, after receiving the login request of the user, the server verifies the identity security of the user based on the login request to determine whether the user is allowed to be accessed or not.
And step S204, the identity security verification is passed, and the code scanning information verification is carried out.
In the embodiment of the invention, after the identity security verification is passed, the code scanning information is required to be checked, and it can be understood that the code scanning information refers to access information submitted by a code scanning terminal and obtained through code scanning, the access information is related to the scanned two-dimensional code, and the code scanning information can be checked to judge whether the two-dimensional code scanned by the user is legal or not.
Step S206, determining the security level according to the identity security verification and the code scanning verification result.
In the embodiment of the invention, the system presets a plurality of security levels, and the security levels can be determined according to the results of identity security verification and code scanning information verification.
Step S208, rejecting or accepting the access of the user according to the security level.
In the embodiment of the invention, the determined security level executes corresponding operation to allow or reject the access of the user, and in addition, the verification record of the system for the user can be updated, so that the history record of the corresponding IP is formed.
The code scanning login early warning method provided by the embodiment of the invention carries out identity security verification and code scanning information verification on the user, so that the security level of the user is determined, corresponding operation is carried out according to the determined security level to accept or accept the access of the user.
In one embodiment, as shown in fig. 3, the identity security verification in step S202 includes the following steps:
step S302, unique access CODE is exchanged based on authorized URL.
Step S304, the CODE passes verification, and the security domain name is transmitted in an asymmetric encryption mode through the HTTPS CA certificate.
In the embodiment of the invention, the unique access CODE can be exchanged with the CODE scanning terminal through the URL (Uniform Resource Locator ) and checked, and the security domain name is transmitted in an asymmetric encryption mode by adopting the HTTPS CA certificate after the check is passed.
The steps ensure the safety of the transmitted data on the data transmission layer and prevent the data from being stolen in the transmission process.
In one embodiment, as shown in fig. 4, step S304 may further include the following steps:
step S402, call and obtain the TOKEN of interface authentication, verify the time stamp, unique app id and app secret of the said TOKEN.
Step S404, verifying, through the OAuth 2.0 mode, exchanging a temporary TOKEN after RAS encryption by the app id+app secret.
In step S406, the basic information of the user is exchanged through the temporary TOKEN, and whether TOKEN is invalid is verified each time.
In the embodiment of the invention, an OAuth 2.0 authorization mechanism is adopted for authentication. By verifying whether TOKEN fails each time, the timeliness of the session can be maintained.
In one embodiment, the code scanning information checking includes the following steps:
checking whether the format of the code scanning information is correct;
or if the code scanning information format is correct, checking the code scanning information source;
if the code scanning information source verification passes, performing code scanning terminal verification;
if the code scanning terminal passes the verification, the side performs trial-and-error checking;
if the trial-error record does not exist, the verification is passed.
In the embodiment of the invention, format verification comprises case verification, high similarity value verification and the like; each two-dimensional code can carry information of a provider, and whether the source of the two-dimensional code is normal or not can be judged by checking the information of the provider; the method also comprises trial-and-error checking, namely, whether the two-dimensional code is subjected to multiple trial-and-error or not is checked, and the checking can identify the two-dimensional code subjected to multiple trial-and-error by the current user or other users, so that the system or the user is reminded of possible risks of the two-dimensional code from the angle of the two-dimensional code. In addition, whether the two-dimension code is invalidated or not can be checked, and the user IP sending the access request through the invalidated or not activated two-dimension code can be prevented from being accessed or marked with an alarm.
In one embodiment, the security level comprises:
serious risk: the abnormal times of the gathering code scanning of the IP, the mobile phone number and the user ID reach the threshold preset by the system and request the IP address library in batches;
important risk: the code scanning times reach the system early warning value, invalid codes exist, trial-error codes exist, and the code scanning times reach the set threshold value in unit time;
abnormal risk: the method comprises the steps of regularly replacing IP addresses at high frequency to scan codes, requesting suspected machines in batches, and enabling a token with login failure to exist, wherein the user ID replacement frequency reaches a second-level threshold;
routine risk: the code scanning amount is increased suddenly in unit time, the trial-error IP/trial code reaches a set threshold, and the user ID replacement frequency reaches a first-level threshold;
normal state: no abnormal condition exists.
In the embodiment of the invention, for setting the threshold values, the range of the threshold values of different risk levels is different; for the same index, the higher the risk level, the greater the threshold. For users with serious risks, access is denied and the users are added to a blacklist; for users with important risks, access can be refused and added to the temporary blacklist, and the users are removed from the temporary blacklist when related early warning behaviors do not appear repeatedly in a period of time; access may be denied for the presence of abnormal risk; for the presence of conventional risks, access may be allowed, but the user is added to the supervision list to keep track of its subsequent operations; for normal state users, access may be allowed.
In one embodiment, the code scanning login early warning method further includes the following steps:
determining the proportion distribution of the user security level in the previous unit time;
and calling a level definition interface, and adjusting the item rule and the threshold according to the proportion distribution.
In the embodiment of the invention, the unit time can be determined according to the real-time flow of the user, for example, the flow standard is set to 1000 people, and the time length reaching 1000 people or the approximate value thereof is counted to be used as the unit time. In unit time, the number or proportion distribution of the security levels of the users is counted, when the high risk (including serious risk, important risk and abnormal risk for example) accounts for a certain value or the data reaches a certain value (for example, more than 50%), the system can judge that the current abnormal login requests are more, and the threshold value of each index can be temporarily reduced to prevent possible invasion, so that valuable login requests can be conveniently screened out from the login requests.
In one embodiment, the verification process further comprises the following steps after passing:
and returning to the level definition interface for the item end to call.
In the embodiment of the invention, it can be understood that after the login request of each user is processed, the definition interface is returned again, so that the real-time redefinition of each item can be realized.
As shown in fig. 5, in one embodiment, a code scanning login early warning device is provided, where the code scanning login early warning device includes:
the identity verification module 501 is configured to receive a login request and perform identity security verification;
the code scanning verification module 502 is configured to perform code scanning information verification after the identity security verification is passed;
a security level determining module 503, configured to determine a security level according to a result of the identity security verification and the code scanning verification;
an operation module 504, configured to reject or accept access of the user according to the security level.
In the embodiment of the present invention, for explanation of each module of the code scanning login early warning device, please refer to the explanation of the code scanning login early warning method section of the present invention, and the embodiment of the present invention is not described herein again.
FIG. 6 illustrates an internal block diagram of a computer device in one embodiment. The computer device may be specifically the server 120 of fig. 1. As shown in fig. 6, the computer device includes a processor, a memory, a network interface, an input device, and a display screen connected by a system bus. The memory includes a nonvolatile storage medium and an internal memory. The nonvolatile storage medium of the computer equipment stores an operating system and also can store a computer program, and when the computer program is executed by a processor, the processor can realize the code scanning login early warning method provided by the embodiment of the invention. The internal memory can also store a computer program, and when the computer program is executed by the processor, the processor can be caused to execute the code scanning login early warning method provided by the embodiment of the invention. The display screen of the computer equipment can be a liquid crystal display screen or an electronic ink display screen, the input device of the computer equipment can be a touch layer covered on the display screen, can also be keys, a track ball or a touch pad arranged on the shell of the computer equipment, and can also be an external keyboard, a touch pad or a mouse and the like.
It will be appreciated by those skilled in the art that the structure shown in FIG. 6 is merely a block diagram of some of the structures associated with the present inventive arrangements and is not limiting of the computer device to which the present inventive arrangements may be applied, and that a particular computer device may include more or fewer components than shown, or may combine some of the components, or have a different arrangement of components.
In one embodiment, the code scanning login early warning device provided by the embodiment of the invention can be implemented in a form of a computer program, and the computer program can run on a computer device as shown in fig. 6. The memory of the computer device may store various program modules that constitute the code scanning login early warning device, such as the identity verification module, the code scanning verification module, the security level determination module, and the operation module shown in fig. 5. The computer program formed by the program modules enables the processor to execute the steps in the code scanning login early warning method according to the embodiments of the invention described in the specification.
For example, the computer device shown in fig. 6 may execute step S202 through the authentication module in the code scanning login early warning device shown in fig. 5; the computer device may execute step S204 through the code scanning verification module; the computer device may execute step S206 through the security level determination module; the computer device may execute step S208 through the operation module.
In one embodiment, a computer device is presented, the computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the following steps when executing the computer program:
receiving a login request and carrying out identity security verification;
the identity security verification is passed, and the code scanning information verification is carried out;
determining the security level according to the identity security verification and the code scanning verification result;
and rejecting or accepting the access of the user according to the security level.
In one embodiment, a computer readable storage medium is provided, having a computer program stored thereon, which when executed by a processor causes the processor to perform the steps of:
receiving a login request and carrying out identity security verification;
the identity security verification is passed, and the code scanning information verification is carried out;
determining the security level according to the identity security verification and the code scanning verification result;
and rejecting or accepting the access of the user according to the security level.
It should be understood that, although the steps in the flowcharts of the embodiments of the present invention are shown in order as indicated by the arrows, these steps are not necessarily performed in order as indicated by the arrows. The steps are not strictly limited to the order of execution unless explicitly recited herein, and the steps may be executed in other orders. Moreover, at least some of the steps in various embodiments may include multiple sub-steps or stages that are not necessarily performed at the same time, but may be performed at different times, nor do the order in which the sub-steps or stages are performed necessarily performed in sequence, but may be performed alternately or alternately with at least a portion of the sub-steps or stages of other steps or other steps.
Those skilled in the art will appreciate that all or part of the processes in the methods of the above embodiments may be implemented by a computer program for instructing relevant hardware, where the program may be stored in a non-volatile computer readable storage medium, and where the program, when executed, may include processes in the embodiments of the methods described above. Any reference to memory, storage, database, or other medium used in embodiments provided herein may include non-volatile and/or volatile memory. The nonvolatile memory can include Read Only Memory (ROM), programmable ROM (PROM), electrically Programmable ROM (EPROM), electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double Data Rate SDRAM (DDRSDRAM), enhanced SDRAM (ESDRAM), synchronous Link DRAM (SLDRAM), memory bus direct RAM (RDRAM), direct memory bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM), among others.
The technical features of the above-described embodiments may be arbitrarily combined, and all possible combinations of the technical features in the above-described embodiments are not described for brevity of description, however, as long as there is no contradiction between the combinations of the technical features, they should be considered as the scope of the description.
The foregoing examples illustrate only a few embodiments of the invention and are described in detail herein without thereby limiting the scope of the invention. It should be noted that it will be apparent to those skilled in the art that several variations and modifications can be made without departing from the spirit of the invention, which are all within the scope of the invention. Accordingly, the scope of protection of the present invention is to be determined by the appended claims.

Claims (7)

1. The code scanning login early warning method is characterized by comprising the following steps of:
receiving a login request and carrying out identity security verification;
the identity security verification is passed, and the code scanning information verification is carried out;
determining the security level according to the identity security verification and the code scanning verification result;
rejecting or accepting the access of the user according to the security level;
the code scanning information verification comprises the following steps:
checking whether the format of the code scanning information is correct;
if the code scanning information format is correct, checking the code scanning information source;
if the code scanning information source verification passes, performing code scanning terminal verification;
if the code scanning terminal passes the verification, performing trial-and-error checking;
if the trial error record does not exist, checking is passed;
the code scanning login early warning method further comprises the following steps:
determining the proportion distribution of the user security level in the previous unit time;
calling a level definition interface, and adjusting a project rule and a threshold value according to the proportion distribution;
the security level includes:
serious risk: the abnormal times of the gathering code scanning of the IP, the mobile phone number and the user ID reach the threshold preset by the system and request the IP address library in batches;
important risk: the code scanning times reach the system early warning value, invalid codes exist, trial-error codes exist, and the code scanning times reach the set threshold value in unit time;
abnormal risk: the method comprises the steps of regularly replacing IP addresses at high frequency to scan codes, requesting suspected machines in batches, and enabling a token with login failure to exist, wherein the user ID replacement frequency reaches a second-level threshold;
routine risk: the code scanning amount is increased suddenly in unit time, the trial-error IP/trial code reaches a set threshold, and the user ID replacement frequency reaches a first-level threshold;
normal state: no abnormal condition exists.
2. The code scanning login early warning method according to claim 1, characterized in that said performing identity security verification comprises the steps of:
exchanging unique access CODEs CODE based on the authorized URL;
the CODE passes verification, and the security domain name is transmitted in an asymmetric encryption mode through the HTTPS CA certificate.
3. The code scanning login early warning method according to claim 2, characterized in that the code scanning login early warning method further comprises:
invoking TOKEN for acquiring interface authentication, and verifying the timestamp, unique app id and app secret of the TOKEN;
the verification is passed, RAS encryption is carried out by using an app id+app secret in a mode of OAuth 2.0, and then a group of temporary TOKENs is exchanged;
and exchanging basic information of the user through the temporary TOKEN, and verifying whether the TOKEN is invalid or not each time.
4. The code scanning login early warning method according to claim 1, characterized in that after the verification is passed, the method further comprises the following steps:
and returning to the level definition interface for the item end to call.
5. A code scanning login early warning device, characterized in that the method according to any one of claims 1-4 is adopted, and the code scanning login early warning device comprises:
the identity verification module is used for receiving a login request and carrying out identity security verification;
the code scanning verification module is used for carrying out code scanning information verification after the identity security verification is passed;
the security level determining module is used for determining the security level according to the identity security verification and the code scanning verification result;
and the operation module is used for rejecting or accepting the access of the user according to the security level.
6. A computer device comprising a memory and a processor, the memory having stored therein a computer program which, when executed by the processor, causes the processor to perform the steps of the code scanning login early warning method of any one of claims 1 to 4.
7. A computer readable storage medium, wherein a computer program is stored on the computer readable storage medium, which when executed by a processor causes the processor to perform the steps of the code scanning login pre-warning method according to any one of claims 1 to 4.
CN202110943936.8A 2021-08-17 2021-08-17 Code scanning login early warning method and device, computer equipment and storage medium Active CN113627208B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110943936.8A CN113627208B (en) 2021-08-17 2021-08-17 Code scanning login early warning method and device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110943936.8A CN113627208B (en) 2021-08-17 2021-08-17 Code scanning login early warning method and device, computer equipment and storage medium

Publications (2)

Publication Number Publication Date
CN113627208A CN113627208A (en) 2021-11-09
CN113627208B true CN113627208B (en) 2024-04-05

Family

ID=78386106

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110943936.8A Active CN113627208B (en) 2021-08-17 2021-08-17 Code scanning login early warning method and device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN113627208B (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104331728A (en) * 2014-10-24 2015-02-04 安徽农业大学 Two-dimensional code generation method and application thereof
CN104378368A (en) * 2014-11-10 2015-02-25 武汉传神信息技术有限公司 Code scanning log-in method and system
CN106936803A (en) * 2015-12-31 2017-07-07 亿阳安全技术有限公司 Two-dimensional code scanning certification login method and relevant apparatus
WO2018019243A1 (en) * 2016-07-28 2018-02-01 腾讯科技(深圳)有限公司 Verification method, apparatus and device, and storage medium
CN108092975A (en) * 2017-12-07 2018-05-29 上海携程商务有限公司 Recognition methods, system, storage medium and the electronic equipment of abnormal login
CN108599931A (en) * 2018-04-12 2018-09-28 深圳市易迈数据技术有限公司 Safe code generating method based on big data and its method of calibration
CN111460423A (en) * 2020-03-03 2020-07-28 深圳市思迪信息技术股份有限公司 Two-dimensional code scanning login method and device
CN113191169A (en) * 2021-05-24 2021-07-30 中国工商银行股份有限公司 Terminal code scanning login method, device and system

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8935777B2 (en) * 2012-02-17 2015-01-13 Ebay Inc. Login using QR code
CN104378344B (en) * 2014-05-26 2016-03-09 腾讯科技(深圳)有限公司 Log-on message transmission method, barcode scanning method and device, background server
CN107645482B (en) * 2016-07-22 2020-08-07 创新先进技术有限公司 Risk control method and device for business operation

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104331728A (en) * 2014-10-24 2015-02-04 安徽农业大学 Two-dimensional code generation method and application thereof
CN104378368A (en) * 2014-11-10 2015-02-25 武汉传神信息技术有限公司 Code scanning log-in method and system
CN106936803A (en) * 2015-12-31 2017-07-07 亿阳安全技术有限公司 Two-dimensional code scanning certification login method and relevant apparatus
WO2018019243A1 (en) * 2016-07-28 2018-02-01 腾讯科技(深圳)有限公司 Verification method, apparatus and device, and storage medium
CN108092975A (en) * 2017-12-07 2018-05-29 上海携程商务有限公司 Recognition methods, system, storage medium and the electronic equipment of abnormal login
CN108599931A (en) * 2018-04-12 2018-09-28 深圳市易迈数据技术有限公司 Safe code generating method based on big data and its method of calibration
CN111460423A (en) * 2020-03-03 2020-07-28 深圳市思迪信息技术股份有限公司 Two-dimensional code scanning login method and device
CN113191169A (en) * 2021-05-24 2021-07-30 中国工商银行股份有限公司 Terminal code scanning login method, device and system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
基于智能移动终端密码模块的身份认证方案实现;赵凯利;李丹仪;李强;马存庆;;信息网络安全;20170910(第09期);全文 *

Also Published As

Publication number Publication date
CN113627208A (en) 2021-11-09

Similar Documents

Publication Publication Date Title
US11108752B2 (en) Systems and methods for managing resetting of user online identities or accounts
US10558797B2 (en) Methods for identifying compromised credentials and controlling account access
CN111353903B (en) Network identity protection method and device, electronic equipment and storage medium
US10462665B2 (en) Multifactor network authentication
CN110300096B (en) Self-checking method, device and equipment based on local certificate and storage medium
CN112333198A (en) Secure cross-domain login method, system and server
US20190124100A1 (en) Robotic process automation resource insulation system
CN109600377B (en) Method and device for preventing unauthorized use computer device and storage medium
CN108256322B (en) Security testing method and device, computer equipment and storage medium
CN111241555B (en) Access method and device for simulating user login, computer equipment and storage medium
CN113472774B (en) Account login-free method, system, device and computer readable storage medium
US10462126B2 (en) Self-adjusting multifactor network authentication
CN109547426B (en) Service response method and server
CN109347865B (en) User data authentication and evidence storage method and system based on block chain technology
CN112367338A (en) Malicious request detection method and device
CN111683047A (en) Unauthorized vulnerability detection method and device, computer equipment and medium
CN111177741A (en) Pre-authorization data access method and device based on enterprise browser
CN110516172B (en) Resource calling method and device, computer equipment and storage medium
CN111652720A (en) Cloud evidence obtaining method and device, computer equipment and storage medium
CN113627208B (en) Code scanning login early warning method and device, computer equipment and storage medium
CN110503432B (en) Method, device and computer readable storage medium for processing resource transfer request
CN115065562B (en) Block chain-based injection determination method, device, equipment and storage medium
US11675920B2 (en) Call location based access control of query to database
CN110866210A (en) Log control method, device and equipment for browser user
CN114866340B (en) Identity verification method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant