CN113709192A - Method and device for improving safety of Internet of things - Google Patents

Method and device for improving safety of Internet of things Download PDF

Info

Publication number
CN113709192A
CN113709192A CN202111258675.2A CN202111258675A CN113709192A CN 113709192 A CN113709192 A CN 113709192A CN 202111258675 A CN202111258675 A CN 202111258675A CN 113709192 A CN113709192 A CN 113709192A
Authority
CN
China
Prior art keywords
user
folder
access
identifier
authorization
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111258675.2A
Other languages
Chinese (zh)
Inventor
谷雪美
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xuzhou Snail Intelligent Technology Co ltd
Original Assignee
Xuzhou Snail Intelligent Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xuzhou Snail Intelligent Technology Co ltd filed Critical Xuzhou Snail Intelligent Technology Co ltd
Priority to CN202111258675.2A priority Critical patent/CN113709192A/en
Publication of CN113709192A publication Critical patent/CN113709192A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0807Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention provides a method and a device for improving the safety of the Internet of things, and relates to the technology of the Internet of things, wherein an access token of a user is obtained, and the user is determined to be in a login state based on the access token; acquiring associated access authority based on a user ID, wherein the access authority comprises a plurality of authorization identifiers, and the authorization identifiers correspond to a plurality of folder identifiers allowing the user to access folders; acquiring operation data of the user in real time within effective time, wherein the operation data comprises folder identifications of folder accessed by the user; and determining the login state of the user according to the authorization identifier and the folder identifier. According to the scheme, the safety of the folder can be ensured through two times of verification, so that a user can only access the corresponding folder.

Description

Method and device for improving safety of Internet of things
Technical Field
The invention relates to the technology of the Internet of things, in particular to a method and a device for improving the safety of the Internet of things.
Background
The internet of things is an information carrier based on the internet, a traditional telecommunication network and the like, and the ubiquitous connection of objects and people is realized through various possible network accesses, so that the intelligent perception, identification and management of the objects and the process are realized.
At present, in the era of rapid development of internet sharing, file sharing is increasingly important. When the folders are shared, all users logging in the sharing platform can access the shared folders, and when a plurality of folders with different confidentiality degrees exist in the shared folders, conditions such as disclosure can occur, and therefore, the security in the prior art is low when the folders are shared.
Disclosure of Invention
The embodiment of the invention provides a method and a device for improving the safety of the Internet of things, which can improve the safety when a folder is shared and reduce the occurrence of divulgence and the like.
In a first aspect of the embodiments of the present invention, a method for improving security of an internet of things is provided, including:
obtaining an access token of a user, and determining that the user is in a login state based on the access token;
acquiring associated access authority based on a user ID, wherein the access authority comprises a plurality of authorization identifiers, and the authorization identifiers correspond to a plurality of folder identifiers allowing the user to access folders;
acquiring operation data of the user in real time within effective time, wherein the operation data comprises folder identifications of folder accessed by the user;
and determining the login state of the user according to the authorization identifier and the folder identifier.
Optionally, in a possible implementation manner of the first aspect, the determining, according to the authorization identifier and the folder identifier, a login status of the user includes:
comparing the folder identification with the authorization identification;
and if any folder identifier is inconsistent with the authorization identifier, determining that the user is in a non-login state.
Optionally, in a possible implementation manner of the first aspect, if any of the folder identifiers is not consistent with the authorization identifier, determining that the user is in an unregistered state includes:
if any folder identifier is inconsistent with the authorization identifier, acquiring the access time of a user for accessing the folder corresponding to the inconsistent folder identifier;
and determining that the user is in an unregistered state according to preset time and the access time.
Optionally, in a possible implementation manner of the first aspect, the determining that the user is in an unregistered state according to preset time and the access time includes:
and if the access time is greater than the preset time, determining that the user is in an unregistered state.
Optionally, in a possible implementation manner of the first aspect, if any of the folder identifiers is not consistent with the authorization identifier, determining that the user is in an unregistered state includes:
if any folder identifier is inconsistent with the authorization identifier, acquiring the access times of the user for accessing the folder corresponding to the inconsistent folder identifier;
and determining that the user is in an unregistered state according to the preset times and the access times.
Optionally, in a possible implementation manner of the first aspect, the determining that the user is in an unregistered state according to preset time and the access time includes:
and if the access times are greater than the preset times, determining that the user is in an unregistered state.
Optionally, in a possible implementation manner of the first aspect, the obtaining an access token of a user, and determining that the user is in a login state based on the access token, includes:
acquiring an access token of a user;
verifying the access token to obtain verification success information;
sending the verification success information to a management end, and displaying user information on the management end;
and receiving authorization information sent by the management terminal, and determining that the user is in a login state based on the authorization information.
Optionally, in a possible implementation manner of the first aspect, the performing verification processing on the access token and obtaining verification success information includes:
acquiring user information and expiration time of the access token;
and verifying the user information and the expiration time to obtain the verification success information.
Optionally, in a possible implementation manner of the first aspect, before the obtaining, based on the user ID, an associated access right, where the access right includes multiple authorization identifiers, the method further includes:
and receiving a folder identifier allowing the user to access the folder, and taking the folder identifier as the authorization identifier.
In a second aspect of the embodiments of the present invention, a device for improving the security of an internet of things is provided, including:
the information module is used for acquiring the valid time of the user access token and acquiring the associated access authority based on the user ID, wherein the access authority comprises a plurality of authorization identifiers, and the authorization identifiers correspond to a plurality of folder identifiers allowing the user to access folders;
the identification module is used for acquiring the operation data of the user in real time within the effective time, wherein the operation data comprises a folder identifier of a folder accessed by the user;
and the judging module is used for determining the login state of the user according to the authorization identifier and the folder identifier.
In a third aspect of the embodiments of the present invention, an apparatus for improving security of an internet of things is provided, including: memory, a processor and a computer program, the computer program being stored in the memory, the processor running the computer program to perform the method of the first aspect of the invention as well as various possible aspects of the first aspect.
A fourth aspect of the embodiments of the present invention provides a readable storage medium, in which a computer program is stored, the computer program being, when executed by a processor, configured to implement the method according to the first aspect of the present invention and various possible aspects of the first aspect.
The method and the device for improving the security of the internet of things provided by the invention have the advantages that the identity of a user is preliminarily verified by obtaining an access token of the user and determining the login state of the user based on the access token, namely, the first verification is carried out, then, the associated access authority is obtained based on the ID of the user, the access authority comprises a plurality of authorization identifiers, the authorization identifiers correspond to a plurality of folder identifiers allowing the user to access folders, namely, identifiers corresponding to the folders accessible by the user are given to the user, then, the operation data of the user is obtained in real time in effective time, the operation data comprises the folder identifiers of the folder accessed by the user, namely, the folder identifiers accessed by the user are obtained in real time, then, the two folder identifiers are compared, so that the login state of the user is determined, namely, the login state of the user is determined according to the authorization identifiers and the folder identifiers, this step is a second verification. The method and the device can ensure the safety of the folders through two verification steps by identifying whether the identification of the folder accessed by the user is the authorized identification or not and forcing the user to log out if the identification of the folder accessed by the user is not the authorized identification, so that the user can only access the corresponding folders.
Drawings
Fig. 1 is a schematic diagram of an application scenario provided in an embodiment of the present invention;
fig. 2 is a schematic flow chart of a method for improving the security of the internet of things according to an embodiment of the present invention;
fig. 3 is a device for improving the security of the internet of things according to the embodiment of the present invention;
fig. 4 is a schematic diagram of a hardware structure of the device for improving the security of the internet of things according to the embodiment of the present invention.
In the figure, 30, a device for improving the safety of the internet of things; 31. an information module; 32. an identification module; 33. a judgment module; 40. Equipment for improving the safety of the Internet of things; 41. a processor; 42. a memory; 43. a bus.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Fig. 1 is a schematic view of an application scenario provided in an embodiment of the present invention. The shared folders comprise a folder 1, a folder 2 and a folder 3, all users can access some folders with lower confidentiality (such as the folders 1 and 2), and only some users with higher authority can access some folders with higher level (such as the folder 3). However, in the prior art, a user joining sharing can access the folders 1, 2 and 3 to multiple folders, however, in actual operation, an organizer of a shared file often needs users of different levels to access different folders, and access to some folders is prohibited, so as to improve security and prevent divulgence and other phenomena. The prior art cannot limit the access of users.
In order to solve the technical problem, the invention is characterized in that different identifiers are given to different users, then the identifiers of folders accessed by the users are detected in real time, whether the identifiers of the folders accessed by the users are authorized identifiers or not is identified, and if not, the users are forced to log out, so that the safety of the folders is ensured, and the users can only access the corresponding folders.
Referring to fig. 2, which is a schematic flow chart of a method for improving security of the internet of things according to an embodiment of the present invention, an execution main body of the method shown in fig. 2 may be a software and/or hardware device. The execution subject of the present application may include, but is not limited to, at least one of: user equipment, network equipment, etc. The user equipment may include, but is not limited to, a computer, a smart phone, a Personal Digital Assistant (PDA), the above mentioned electronic equipment, and the like. The network device may include, but is not limited to, a single network server, a server group of multiple network servers, or a cloud of numerous computers or network servers based on cloud computing, wherein cloud computing is one type of distributed computing, a super virtual computer consisting of a cluster of loosely coupled computers. The present embodiment does not limit this. The method for improving the safety of the Internet of things comprises the following steps from S101 to S104:
s101, obtaining an access token of a user, and determining that the user is in a login state based on the access token.
This step is to perform preliminary verification on the information of the user, where the access token is a representative of each user, and includes, for example, user IDs, user passwords, and other information of different users, and this step may be to perform verification on the user IDs, user passwords, and other information of the users.
It will be appreciated that after the access token is authenticated, the user may be placed in a login state, i.e., the user is logged in successfully.
In some embodiments, in order to improve the security of the verification, this step may acquire an access token of the user; verifying the access token to obtain verification success information; sending the verification success information to a management end, and displaying user information on the management end; and receiving authorization information sent by the management terminal, and determining that the user is in a login state based on the authorization information.
It can be understood that the method increases the authentication of the management terminal, after the user successfully authenticates the identity, the information is sent to the management terminal for displaying, then the management terminal can send the authorization information based on the displayed information, and the user is allowed to log in after receiving the authorization information, thereby further improving the security.
The access token is verified, and verification success information is obtained for verification, wherein the verification is performed by obtaining user information and expiration time of the access token; and verifying the user information and the expiration time to obtain the verification success information.
It can be understood that the method acquires the access expiration time of the user in real time, and if the user is within the access expiration time, the user can be authenticated by combining with other information to obtain information that the authentication is successful, and conversely, if the user is outside the access expiration time, the user can be authenticated by failing to obtain information that the authentication is unsuccessful.
S102, obtaining associated access authority based on a user ID, wherein the access authority comprises a plurality of authorization identifiers, and the authorization identifiers correspond to a plurality of folder identifiers allowing the user to access folders.
In order to distinguish the access rights of the users, the embodiment associates the access rights with the users, that is, different users have different access rights.
The authorization identifier included in the access right is corresponding to the folder, for example, the identifiers corresponding to the folder 1, the folder 2, and the folder 3 may be the identifier 1, the identifier 2, and the identifier 3, respectively.
The access right of the user 1 may be that only the user is allowed to access the folder 1 and the folder 2, then the access right of the user 1, i.e. the authorization identifiers are identifier 1 and identifier 2, and the access right of the user 2 may be that only the user is allowed to access the folder 1, then the access right of the user 1 is identifier 1.
In practical application, the mark may be one or a combination of a plurality of numeric marks, character marks and letter marks, and different marks can be distinguished.
It should be noted that, before obtaining the associated access right based on the user ID, the access right includes multiple authorization identifiers, the method further includes: and receiving a folder identifier allowing the user to access the folder, and taking the folder identifier as the authorization identifier.
S103, acquiring the operation data of the user in real time within the effective time, wherein the operation data comprises the folder identification of the folder accessed by the user.
In this embodiment, the folder identifier accessed by the user in the actual operation is obtained in real time, for example, the folder identifier may be an identifier corresponding to a folder, for example, when the user 1 accesses the folder 1, the folder 2, and the folder 3, the folder identifier accessed by the user in the actual operation is obtained in real time as the identifier 1, the identifier 2, and the identifier 3.
S104, determining the login state of the user according to the authorization identifier and the folder identifier.
The scheme can be that a folder identifier and an authorization identifier are compared, and if any folder identifier is inconsistent with the authorization identifier, the user is determined to be in an unregistered state.
The access authority of the user 1, namely the authorized identifiers are identifier 1 and identifier 2, and the folder identifiers accessed by the user in actual operation are acquired in real time and are identifier 1, identifier 2 and identifier 3, wherein the identifier 3 is inconsistent with the authorized identifiers, so that the user is forced to log out, the security of the folder is improved, and the disclosure is prevented.
The method for improving the security of the internet of things provided in the above embodiment includes obtaining an access token of a user, determining that the user is in a login state based on the access token, performing preliminary verification, that is, first verification, and then obtaining associated access rights based on a user ID, where the access rights include a plurality of authorization identifiers corresponding to a plurality of folder identifiers allowing the user to access folders, that is, identifiers corresponding to folders accessible to the user, and then obtaining operation data of the user in real time within an effective time, where the operation data includes the folder identifier of the folder accessed by the user, that is, the folder identifier of the folder accessed by the user is obtained in real time, and then comparing the two folder identifiers, thereby determining the login state of the user, that is, determining the login state of the user according to the authorization identifier and the folder identifier, this step is a second verification. The method and the device can ensure the safety of the folders through two verification steps by identifying whether the identification of the folder accessed by the user is the authorized identification or not and forcing the user to log out if the identification of the folder accessed by the user is not the authorized identification, so that the user can only access the corresponding folders.
In the actual operation of the user, there may be an incorrect operation by the user, for example, the user 1 originally does not want to access the folder 3, and inadvertently clicks the folder 3, and then quickly exits the folder 3, and does not perform subsequent access to the folder 3, if the user is forced to exit the login in this case, the user experience may be affected, and network resources may also be wasted, in order to solve the above technical problem, on the basis of the above embodiment, there are two specific implementation manners of step S104 (if any folder identifier and the authorization identifier are not consistent, it is determined that the user is in an unregistered state), which are specifically as follows:
the first embodiment is as follows:
if any folder identifier is inconsistent with the authorization identifier, acquiring the access time of a user for accessing the folder corresponding to the inconsistent folder identifier; and determining that the user is in an unregistered state according to preset time and the access time.
In this embodiment, the access time of the folder corresponding to the folder identifier with inconsistent access of the user is obtained, that is, whether the user is in misoperation or in real access is judged according to the access time, so as to judge whether the user is forced to log out, and if the access time is longer than the preset time, it is determined that the user is in a non-log-in state.
If the preset time is 10S and the detected user access time is 5S, the access time is less than the preset time, the user is judged to be misoperation, the user is not forced to log out, if the detected user access time is 15S, the access time is greater than the preset time, the user is judged to be real access, and the user is forced to log out.
The second embodiment is as follows:
if any folder identifier is inconsistent with the authorization identifier, acquiring the access times of the user for accessing the folder corresponding to the inconsistent folder identifier; and determining that the user is in the unregistered state according to the preset times and the access times, and determining that the user is in the unregistered state if the access times are greater than the preset times.
In this embodiment, the access times of the folders corresponding to the folder identifiers with inconsistent access by the user are obtained, that is, whether the user is in misoperation or in real access is judged according to the access times, so as to judge whether the user is forced to log out, and if the access times are greater than the preset times, it is determined that the user is in a non-log-in state.
If the preset time is 2 times and the detected user access time is 1 time, the access times are less than the preset times, the user is judged to be misoperation, the user is not forced to log out, if the detected user access times are 3 times, the access times are greater than the preset times, the user is judged to be real access, and the user is forced to log out.
Referring to fig. 3, a device for improving the security of the internet of things according to an embodiment of the present invention is provided, where the device 30 for improving the security of the internet of things includes:
the information module 31 is configured to obtain valid time of a user access token, and obtain an associated access right based on a user ID, where the access right includes multiple authorization identifiers, and the authorization identifiers correspond to multiple folder identifiers that allow the user to access folders;
the identification module 32 is configured to obtain operation data of the user in real time within a valid time, where the operation data includes a folder identifier of a folder accessed by the user;
and the judging module 33 is configured to determine the login state of the user according to the authorization identifier and the folder identifier.
The apparatus in the embodiment shown in fig. 3 can be correspondingly used to perform the steps in the method embodiment shown in fig. 2, and the implementation principle and technical effect are similar, which are not described herein again.
Referring to fig. 4, which is a schematic diagram of a hardware structure of an apparatus for improving security of the internet of things according to an embodiment of the present invention, the apparatus 40 for improving security of the internet of things includes: a processor 41, memory 42 and computer programs; wherein
A memory 42 for storing the computer program, which may also be a flash memory (flash). The computer program is, for example, an application program, a functional module, or the like that implements the above method.
A processor 41 for executing the computer program stored in the memory to implement the steps performed by the apparatus in the above method. Reference may be made in particular to the description relating to the preceding method embodiment.
Alternatively, the memory 42 may be separate or integrated with the processor 41.
When the memory 42 is a device independent of the processor 41, the apparatus may further include:
a bus 43 for connecting the memory 42 and the processor 41.
The present invention also provides a readable storage medium, in which a computer program is stored, which, when being executed by a processor, is adapted to implement the methods provided by the various embodiments described above.
The readable storage medium may be a computer storage medium or a communication medium. Communication media includes any medium that facilitates transfer of a computer program from one place to another. Computer storage media may be any available media that can be accessed by a general purpose or special purpose computer. For example, a readable storage medium is coupled to the processor such that the processor can read information from, and write information to, the readable storage medium. Of course, the readable storage medium may also be an integral part of the processor. The processor and the readable storage medium may reside in an Application Specific Integrated Circuits (ASIC). Additionally, the ASIC may reside in user equipment. Of course, the processor and the readable storage medium may also reside as discrete components in a communication device. The readable storage medium may be a read-only memory (ROM), a random-access memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device, and the like.
The present invention also provides a program product comprising execution instructions stored in a readable storage medium. The at least one processor of the device may read the execution instructions from the readable storage medium, and the execution of the execution instructions by the at least one processor causes the device to implement the methods provided by the various embodiments described above.
In the above embodiments of the apparatus, it should be understood that the Processor may be a Central Processing Unit (CPU), other general purpose processors, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), etc. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of a method disclosed in connection with the present invention may be embodied directly in a hardware processor, or in a combination of the hardware and software modules within the processor.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solution of the present invention, and not to limit the same; while the invention has been described in detail and with reference to the foregoing embodiments, it will be understood by those skilled in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present invention.

Claims (10)

1. A method for improving the safety of the Internet of things is characterized by comprising the following steps:
obtaining an access token of a user, and determining that the user is in a login state based on the access token;
acquiring associated access authority based on a user ID, wherein the access authority comprises a plurality of authorization identifiers, and the authorization identifiers correspond to a plurality of folder identifiers allowing the user to access folders;
acquiring operation data of the user in real time within effective time, wherein the operation data comprises folder identifications of folder accessed by the user;
and determining the login state of the user according to the authorization identifier and the folder identifier.
2. The method of claim 1, wherein determining the login status of the user based on the authorization identifier and the folder identifier comprises:
comparing the folder identification with the authorization identification;
and if any folder identifier is inconsistent with the authorization identifier, determining that the user is in a non-login state.
3. The method of claim 2, wherein determining that the user is in an unregistered state if any of the folder identifiers and the authorization identifiers are not consistent comprises:
if any folder identifier is inconsistent with the authorization identifier, acquiring the access time of a user for accessing the folder corresponding to the inconsistent folder identifier;
and determining that the user is in an unregistered state according to preset time and the access time.
4. The method of claim 3, wherein the determining that the user is in the unregistered state according to the preset time and the access time comprises:
and if the access time is greater than the preset time, determining that the user is in an unregistered state.
5. The method of claim 2, wherein determining that the user is in an unregistered state if any of the folder identifiers and the authorization identifiers are not consistent comprises:
if any folder identifier is inconsistent with the authorization identifier, acquiring the access times of the user for accessing the folder corresponding to the inconsistent folder identifier;
and determining that the user is in an unregistered state according to the preset times and the access times.
6. The method of claim 5, wherein the determining that the user is in the unregistered state according to the preset time and the access time comprises:
and if the access times are greater than the preset times, determining that the user is in an unregistered state.
7. The method of claim 1, wherein obtaining an access token for a user, and determining that the user is in a logged-on state based on the access token comprises:
acquiring an access token of a user;
verifying the access token to obtain verification success information;
sending the verification success information to a management end, and displaying user information on the management end;
and receiving authorization information sent by the management terminal, and determining that the user is in a login state based on the authorization information.
8. The method of claim 7, wherein the authenticating the access token to obtain authentication success information comprises:
acquiring user information and expiration time of the access token;
and verifying the user information and the expiration time to obtain the verification success information.
9. The method of claim 1, wherein before the obtaining the associated access rights based on the user ID, the access rights including a plurality of authorization identities, further comprising:
and receiving a folder identifier allowing the user to access the folder, and taking the folder identifier as the authorization identifier.
10. The utility model provides a promote thing networking security's device which characterized in that includes:
the information module is used for acquiring the valid time of the user access token and acquiring the associated access authority based on the user ID, wherein the access authority comprises a plurality of authorization identifiers, and the authorization identifiers correspond to a plurality of folder identifiers allowing the user to access folders;
the identification module is used for acquiring the operation data of the user in real time within the effective time, wherein the operation data comprises a folder identifier of a folder accessed by the user;
and the judging module is used for determining the login state of the user according to the authorization identifier and the folder identifier.
CN202111258675.2A 2021-10-28 2021-10-28 Method and device for improving safety of Internet of things Pending CN113709192A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111258675.2A CN113709192A (en) 2021-10-28 2021-10-28 Method and device for improving safety of Internet of things

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111258675.2A CN113709192A (en) 2021-10-28 2021-10-28 Method and device for improving safety of Internet of things

Publications (1)

Publication Number Publication Date
CN113709192A true CN113709192A (en) 2021-11-26

Family

ID=78647174

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111258675.2A Pending CN113709192A (en) 2021-10-28 2021-10-28 Method and device for improving safety of Internet of things

Country Status (1)

Country Link
CN (1) CN113709192A (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20190014111A1 (en) * 2017-07-08 2019-01-10 Bank Of America Corporation Document orchestration system for processing digital consent information
CN112615936A (en) * 2020-12-28 2021-04-06 南京披云信息科技有限公司 Method and device for improving safety of Internet of things

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20190014111A1 (en) * 2017-07-08 2019-01-10 Bank Of America Corporation Document orchestration system for processing digital consent information
CN112615936A (en) * 2020-12-28 2021-04-06 南京披云信息科技有限公司 Method and device for improving safety of Internet of things

Similar Documents

Publication Publication Date Title
US20180234464A1 (en) Brokered authentication with risk sharing
CN111541656A (en) Identity authentication method and system based on converged media cloud platform
CN112769826B (en) Information processing method, device, equipment and storage medium
CN112651011B (en) Login verification method, device and equipment for operation and maintenance system and computer storage medium
CN106878250B (en) Cross-application single-state login method and device
US20120278863A1 (en) Ad-hoc user account creation
CN110268406B (en) Password security
CN109587126A (en) User anthority identifying method and system
CN114139135B (en) Equipment login management method, device and storage medium
CN115022047B (en) Account login method and device based on multi-cloud gateway, computer equipment and medium
CN108737398B (en) Processing method and device of trust system, computer equipment and storage medium
CN113132404A (en) Identity authentication method, terminal and storage medium
CN106888091A (en) Trustable network cut-in method and system based on EAP
CN112464213B (en) Operating system access control method, device, equipment and storage medium
CN112615936A (en) Method and device for improving safety of Internet of things
CN111371811A (en) Resource calling method, resource calling device, client and service server
CN113709192A (en) Method and device for improving safety of Internet of things
CN116208376A (en) Single sign-on method and device, electronic equipment and storage medium
CN110011992A (en) System login method and electronic equipment
WO2022042504A1 (en) Cloud desktop access authentication method, electronic device, and computer readable storage medium
CN115086042A (en) User identity authentication method, user identity authentication system and computer storage medium
CN111367573B (en) Equipment login method, device, storage medium and computer equipment
CN113901428A (en) Login method and device of multi-tenant system
CN113672888A (en) Cloud platform access method, device and system and cloud platform server
CN111814130A (en) Single sign-on method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20211126

RJ01 Rejection of invention patent application after publication