CN114329394A - Multiple identity authentication method, device, terminal and storage medium for rail transit crew - Google Patents
Multiple identity authentication method, device, terminal and storage medium for rail transit crew Download PDFInfo
- Publication number
- CN114329394A CN114329394A CN202111683330.1A CN202111683330A CN114329394A CN 114329394 A CN114329394 A CN 114329394A CN 202111683330 A CN202111683330 A CN 202111683330A CN 114329394 A CN114329394 A CN 114329394A
- Authority
- CN
- China
- Prior art keywords
- user
- client
- verification
- information
- access
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 31
- 238000012795 verification Methods 0.000 claims abstract description 142
- 238000012545 processing Methods 0.000 claims description 18
- 238000004590 computer program Methods 0.000 claims description 11
- 230000001815 facial effect Effects 0.000 claims description 5
- 238000012216 screening Methods 0.000 claims description 3
- 230000007246 mechanism Effects 0.000 abstract description 4
- 238000005516 engineering process Methods 0.000 description 7
- 238000004891 communication Methods 0.000 description 3
- 230000007547 defect Effects 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 238000007726 management method Methods 0.000 description 2
- 206010033799 Paralysis Diseases 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 238000009440 infrastructure construction Methods 0.000 description 1
- 230000002427 irreversible effect Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 230000008569 process Effects 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Images
Landscapes
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The application discloses a rail transit crew member multiple identity authentication method, a rail transit crew member multiple identity authentication device, a rail transit crew member multiple identity authentication terminal and a storage medium, wherein the rail transit crew member multiple identity authentication method comprises the following steps: acquiring a user login password, performing matching verification with a preset login password, acquiring user verification information if the user login password passes the preset login password, performing matching verification with the preset verification information, and allowing a client to access if the user login password passes the preset verification information; after the client is accessed, acquiring user permission, and displaying an application module which the user has the right to access to the client; generating and binding a data token with a validity period, wherein the client is allowed to freely access the application module within the validity period of the data token. The invention combines a double-factor authentication mechanism, utilizes data such as passwords, dynamic and biological verification information and the like, realizes the identification and authentication of the identity of a person by multiple authentication means, effectively ensures the safety of user information and the whole rail transit security system, also lightens the use burden of the user, and avoids the condition that the user is refused to log in by the system due to password confusion and forgetting.
Description
Technical Field
The application relates to a personnel identity authentication scheme, in particular to a rail transit crew member multiple identity authentication method, a rail transit crew member multiple identity authentication device, a rail transit crew member multiple identity authentication terminal and a storage medium, and belongs to the technical field of digital information authentication.
Background
The rail transit is taken as an infrastructure construction project developed by the national key point, orderly develops in various major cities of China in recent years, and the construction of the whole rail transit system of China is also in an initial scale, so that great progress is made in the aspects of the number of rail transit projects, the technical level, the updating of supporting equipment and the like.
Corresponding to the progress of various hardware technologies, the number of rail transit crew members in China is increased year by year, and the personnel architecture and organization scale is increasingly huge. In order to realize reasonable management and control of rail transit crew members and guarantee automatic rail transit operation, at present, management of the crew members is mainly realized by using a rail transit crew member system in the industry, and a user (namely the rail transit crew member) can complete information access and control operation by accessing the rail transit crew member system.
However, when a user logs in the existing track-crossing service system, the user identity is generally authenticated only by using a Password Based Encryption (PBE) authentication technology, and when the encryption technology is used, the user Password (usually a character string) is directly encrypted, and the disadvantages of the encryption technology are mainly reflected in the following aspects.
Firstly, the security level of the password is low; the encrypted password is easy to be cracked violently by an external program, and the information security of the user is influenced. Secondly, the security level of the key is lower; once the key is leaked, the whole rail transit security system is directly paralyzed. Thirdly, the operation difficulty of the user is high; the system needs a lot of passwords, and for a user, a plurality of different passwords need to be memorized, so that the problems of password confusion, forgetting and the like easily occur.
In summary, how to provide a brand-new multi-identity authentication scheme for rail transit crew members facing a rail transit scene on the basis of the prior art to ensure continuous and stable operation of a rail transit crew member system becomes a problem that technicians in the field pay attention to.
Disclosure of Invention
In view of the foregoing defects in the prior art, an object of the present invention is to provide a method, an apparatus, a terminal and a storage medium for multiple identity authentication of rail transit crews in a rail transit scenario, which are as follows.
A method for multiple identity authentication of rail transit crew comprising:
acquiring a user login password, performing data processing on the user login password, performing matching verification on a processing result and a preset login password, acquiring user verification information if the verification is passed, performing matching verification on the user verification information and the preset verification information, and allowing a client to access if the verification is passed;
after the client is accessed, acquiring user permission from the client, and displaying an application module which a user has access to the client according to the user permission;
generating and binding a data token with a validity period, wherein the bound client is allowed to freely access the application module within the validity period of the data token.
Preferably, the obtaining of the user login password, after performing data processing on the user login password, comparing and verifying a processing result with a preset login password, obtaining user verification information if the verification is passed, comparing and verifying the user verification information with preset verification information, and allowing a client to access if the verification is passed, includes:
receiving a user login password input from a client, encrypting the user login password by using an RSA algorithm, and performing matching verification on the encrypted user login password and a preset login password stored in a data recording terminal according to a system key, wherein the verification is successful;
and receiving user authentication information input from the client, performing matching authentication on the user authentication information and preset authentication information, and allowing the client to access if the authentication is passed.
Preferably, the receiving user authentication information input from the client, matching and authenticating the user authentication information with preset authentication information, and allowing the client to access if authentication is passed includes:
receiving user authentication information input from the client, wherein the user authentication information is at least one of dynamic authentication information or biological authentication information, the dynamic authentication information is at least one of short message authentication information and mail authentication information, and the biological authentication information is at least one of fingerprint information, voiceprint information, facial feature information and iris feature information;
when the user verification information is only dynamic verification information, comparing and verifying the user verification information with preset verification information by taking a verification short message/verification mail issued before as the preset verification information, and allowing the client to access if the verification is passed;
when the user verification information is only biological verification information, matching and verifying the user verification information and the preset verification information stored in the data recording end, and allowing the client to access if the user verification information passes verification;
and when the user verification information is dynamic verification information and biological verification information, taking a verification short message/verification mail issued before as part of the preset verification information, comparing and verifying the user verification information with the part of the preset verification information, and matching and verifying the user verification information with the other part of the preset verification information stored in the data recording terminal, wherein the client is allowed to access if the comparison verification and the matching verification are passed.
Preferably, after the client is accessed, the method for obtaining the user right from the client and displaying the application module which the user has the right to access to the client according to the user right includes:
after the client is accessed, extracting user roles and corresponding user permission levels from account information logged in by the client, screening all application modules according to the user permission levels, selecting the application modules which the user has access to, forming an accessible application list, and displaying the application modules which the user in the accessible application list has access to the client.
Preferably, the generating and binding the data token with the validity period, and allowing the bound client to freely access the application module within the validity period of the data token, includes:
after any client is accessed, generating a data token with an expiration date, and binding the data token with the client;
allowing the bound client to freely access the application module during the validity period of the data token;
and when the validity period of the data token is exceeded, disconnecting the client and prompting the client to access again.
A rail transit crew multiple identity authentication device comprising:
the user access module is configured to acquire a user login password, perform data processing on the user login password, perform matching verification on a processing result and a preset login password, acquire user verification information if the user login password passes the verification, perform matching verification on the user verification information and the preset verification information, and allow a client to access if the user login password passes the verification;
the application presentation module is configured to acquire user permission from the client after the client is accessed, and display an application module which a user has access to the client according to the user permission;
an access restriction module configured to generate and bind with the client a data token with a validity period within which the bound client is allowed to freely access the application module.
A terminal comprising a memory, a processor and a computer program stored in the memory and executable on the processor, wherein the processor when executing the computer program implements the steps in the method for multiple identity authentication of rail transit crews as described in any one of the preceding.
A computer-readable storage medium, in which a computer program is stored, which, when being executed by a processor, carries out the steps of the method for multiple identity authentication of rail transit crews as described in any one of the preceding paragraphs.
The advantages of the invention are mainly embodied in the following aspects:
the multiple identity authentication method for rail transit crew, provided by the invention, combines a double-factor authentication mechanism, utilizes data information such as passwords, dynamic mail or short message verification codes, fingerprints, facial information or iris information and the like, realizes the identity identification and authentication of the crew through multiple authentication means, effectively ensures the safety of user information and the whole rail transit security system, also lightens the use burden of users, and avoids the situation that the users are refused to log in by the system due to password confusion and forgetting.
Corresponding to the method, the multiple identity authentication device, the multiple identity authentication terminal and the multiple identity authentication storage medium for rail transit crew, provided by the invention, realize the identity identification and authentication of the rail transit crew through a systematized and standardized data processing flow, further provide a basis for the continuous and stable operation of a rail transit crew system, have higher adaptability and compatibility of a hardware scheme, and can be practically applied to the identity authentication scenes of various rail transit projects.
The invention also provides reference for other schemes related to the identity recognition and authentication technology, can be developed, extended and deeply researched on the basis of the scheme, and has very wide application prospect.
The following detailed description of the embodiments of the present invention is provided in connection with the accompanying drawings for the purpose of facilitating understanding and understanding of the technical solutions of the present invention.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this application, serve to provide a further understanding of the application and to enable other features, objects, and advantages of the application to be more apparent. The drawings and their description illustrate the embodiments of the invention and do not limit it. In the drawings:
fig. 1 is a schematic overall flow chart of the multiple identity authentication method for rail transit crew in the present invention;
FIG. 2 is a schematic diagram illustrating a detailed flow of a multi-identity authentication method for rail transit crew according to the present invention;
fig. 3 is a schematic diagram of the multi-identity authentication device for rail transit crew of the present invention.
Detailed Description
In order to make the technical solutions better understood by those skilled in the art, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application.
The invention provides a rail transit crew multi-identity authentication method, a rail transit crew multi-identity authentication device, a rail transit crew multi-identity authentication terminal and a rail transit crew multi-identity authentication storage medium, which aim at the defects of an encryption authentication technology using passwords and are based on a double-factor authentication mechanism.
In one aspect, the invention relates to a multiple identity authentication method for rail transit crew, which is applicable to a rail transit crew system. The main flow of the method is shown in fig. 1, and comprises the following steps:
s1, obtaining a user login password, performing data processing on the user login password, performing matching verification on a processing result and a preset login password, obtaining user verification information if the verification is passed, performing matching verification on the user verification information and the preset verification information, and allowing the client to access if the verification is passed. As shown in fig. 2, this step may be embodied as the following flow.
S11, the user completes the input of the user login password through the client, the platform receives the user login password input from the client, the user login password is encrypted by using an RSA irreversible algorithm, the encrypted user login password is matched and verified with a preset login password stored in the data recording end according to a system key with the key length of 1024 bits, and if the verification is passed, the subsequent process is executed, otherwise, the user is prompted to log in again.
It should be noted that, in this embodiment, the data recording end is a system database or an ldap (lightweight Directory Access protocol) server.
S12, receiving user authentication information input by the client, matching and authenticating the user authentication information with preset authentication information, and allowing the client to access if the authentication is passed. Further procedures are as follows.
S121, the user obtains the user authentication information through external equipment, and the platform receives the user authentication information input by the client.
In this embodiment, the user authentication information is at least one of dynamic authentication information or biometric authentication information. The dynamic authentication information is at least One of short message authentication information and mail authentication information, and is used for realizing the login of a dynamic-time Password (OTP) of a user. The biological verification information is at least one of fingerprint information, voiceprint information, facial feature information and iris feature information.
It should be noted here that, according to the type of the user authentication information, there is a slight difference in the specific operation of the subsequent operation flow. That is to say that the first and second electrodes,
s122, when the user authentication information is only dynamic authentication information, comparing and authenticating the user authentication information with preset authentication information by taking a previously issued authentication short message/authentication mail as the preset authentication information, and allowing the client to access if the authentication is passed, or prompting the user to log in again if the authentication is passed;
when the user authentication information is only biological authentication information, matching and authenticating the user authentication information and the preset authentication information stored in the data recording terminal, if the user authentication information is passed through the authentication, allowing the client terminal to access, otherwise prompting the user to log in again;
and when the user verification information is dynamic verification information and biological verification information, taking a verification short message/verification mail issued before as part of the preset verification information, comparing and verifying the user verification information with the part of the preset verification information, and matching and verifying the user verification information with the other part of the preset verification information stored in the data recording terminal, wherein if the comparison and verification are passed, the client is allowed to access, otherwise, the user is prompted to log in again.
And S2, after the client is accessed, acquiring user permission from the client, and displaying the application module which the user has the right to access to the client according to the user permission. This step can be embodied as the following flow.
After the client is accessed, extracting a user Role (Role) from account information logged in by the client, acquiring a user authority level corresponding to the user Role according to an authority Group (Group), screening all application modules according to the user authority level, selecting the application modules which the user has the right to access, forming an accessible application list, and displaying the application modules which the user in the accessible application list has the right to access to the client.
S3, generating a data Token (JSON Web Token, JWT) with a validity period and binding the data Token with the client, wherein the bound client is allowed to freely access the application module in the validity period of the data Token. This step can be embodied as the following flow.
S31, after any client is accessed, generating a data token with an expiration date, and binding the data token with the client;
s32, executing subsequent selective operation according to the validity period of the data token, and allowing the bound client to freely access the application module in the validity period of the data token; and when the validity period of the data token is exceeded, disconnecting the client and prompting the client to access again.
In summary, the multiple identity authentication method for rail transit crew provided by the invention combines a two-factor authentication mechanism, utilizes data information such as passwords, dynamic mail or short message verification codes, fingerprints, facial information or iris information and the like, and realizes identification and authentication of the identity of the crew through multiple authentication means, thereby effectively ensuring the safety of user information and the whole rail transit security system, reducing the use burden of the user, and avoiding the situation that the user is refused to log in by the system due to password confusion and forgetting.
In another aspect, the present invention further relates to a multiple identity authentication device for rail transit crew, which is configured as shown in fig. 3, and includes:
the user access module is configured to acquire a user login password, perform data processing on the user login password, perform matching verification on a processing result and a preset login password, acquire user verification information if the user login password passes the verification, perform matching verification on the user verification information and the preset verification information, and allow a client to access if the user login password passes the verification;
the application presentation module is configured to acquire user permission from the client after the client is accessed, and display an application module which a user has access to the client according to the user permission;
an access restriction module configured to generate and bind with the client a data token with a validity period within which the bound client is allowed to freely access the application module.
In one possible implementation manner, the user access module includes:
the password login unit is configured to receive a user login password input from the client, encrypt the user login password by using an RSA algorithm, and perform matching verification on the encrypted user login password and a preset login password stored in the data recording terminal according to a system key, wherein the verification is successful;
and the dynamic verification unit is configured to receive user verification information input by the client, perform matching verification on the user verification information and preset verification information, and allow the client to access if the verification is passed.
In one possible implementation, the application presentation module includes:
and the application list generating and displaying unit is configured to extract user roles and corresponding user permission levels from account information logged in by the client after the client is accessed, screen all application modules according to the user permission levels, select the application modules which the user has access to form an accessible application list, and display the application modules which the user in the accessible application list has access to the client.
In one possible implementation, the access limiting module includes:
the data token binding unit is configured to generate a data token with an expiration date after any client is accessed, and bind the data token with the client;
an access allowing unit configured to allow the bound client to freely access the application module during a validity period of the data token;
and the access interruption unit is configured to disconnect the client and prompt the client to re-access when the validity period of the data token is exceeded.
In yet another aspect, the present invention also relates to a terminal comprising a memory, a processor and a computer program stored in the memory and executable on the processor, wherein the processor executes the computer program to implement the steps of the rail transit crew multiple identity authentication method as described above, such as the steps shown in fig. 1. Alternatively, the processor, when executing the computer program, implements the functions of each module/unit in the above-described device embodiments, for example, the functions of each module/unit shown in fig. 3.
In yet another aspect, the present invention also relates to a computer-readable storage medium, which stores a computer program, which when executed by a processor, implements the steps in the rail transit crew multiple identity authentication method as described above.
The readable storage medium may be a computer storage medium or a communication medium. Communication media includes any medium that facilitates transfer of a computer program from one place to another. Computer storage media may be any available media that can be accessed by a general purpose or special purpose computer. For example, a readable storage medium is coupled to the processor such that the processor can read information from, and write information to, the readable storage medium. Of course, the readable storage medium may also be an integral part of the processor. The processor and the readable storage medium may reside in an Application Specific Integrated Circuits (ASIC). Additionally, the ASIC may reside in user equipment. Of course, the processor and the readable storage medium may also reside as discrete components in a communication device. The readable storage medium may be a read-only memory (ROM), a random-access memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device, and the like.
Corresponding to the content of the method, the multiple identity authentication device, the multiple identity authentication terminal and the multiple identity authentication storage medium for rail transit crew realize the identity identification and authentication of the rail transit crew through a systematized and standardized data processing flow, further provide a basis for the continuous and stable operation of a rail transit crew system, have high adaptability and compatibility of a hardware scheme, and can be practically applied to identity authentication scenes of various rail transit projects.
The invention also provides reference for other schemes related to the identity recognition and authentication technology, can be developed, extended and deeply researched on the basis of the scheme, and has very wide application prospect.
It will be evident to those skilled in the art that the invention is not limited to the details of the foregoing illustrative embodiments, and that the present invention may be embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the invention being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein.
Finally, it should be understood that although the present description refers to embodiments, not every embodiment contains only a single technical solution, and such description is for clarity only, and those skilled in the art should integrate the description, and the technical solutions in the embodiments can be appropriately combined to form other embodiments understood by those skilled in the art.
Claims (8)
1. A multiple identity authentication method for rail transit crew, comprising:
acquiring a user login password, performing data processing on the user login password, performing matching verification on a processing result and a preset login password, acquiring user verification information if the verification is passed, performing matching verification on the user verification information and the preset verification information, and allowing a client to access if the verification is passed;
after the client is accessed, acquiring user permission from the client, and displaying an application module which a user has access to the client according to the user permission;
generating and binding a data token with a validity period, wherein the bound client is allowed to freely access the application module within the validity period of the data token.
2. The multiple identity authentication method for rail transit crew according to claim 1, wherein the obtaining of the user login password, the comparing and verifying of the processing result and the preset login password after the data processing of the user login password, obtaining the user verification information if the verification is passed, comparing and verifying the user verification information and the preset verification information, and allowing the access of the client if the verification is passed, comprises:
receiving a user login password input from a client, encrypting the user login password by using an RSA algorithm, and performing matching verification on the encrypted user login password and a preset login password stored in a data recording terminal according to a system key, wherein the verification is successful;
and receiving user authentication information input from the client, performing matching authentication on the user authentication information and preset authentication information, and allowing the client to access if the authentication is passed.
3. The multiple identity authentication method for rail transit crew of claim 2, wherein the method for receiving the user verification information input from the client, performing matching verification on the user verification information and preset verification information, and allowing the client to access if verification is passed comprises:
receiving user authentication information input from the client, wherein the user authentication information is at least one of dynamic authentication information or biological authentication information, the dynamic authentication information is at least one of short message authentication information and mail authentication information, and the biological authentication information is at least one of fingerprint information, voiceprint information, facial feature information and iris feature information;
when the user verification information is only dynamic verification information, comparing and verifying the user verification information with preset verification information by taking a verification short message/verification mail issued before as the preset verification information, and allowing the client to access if the verification is passed;
when the user verification information is only biological verification information, matching and verifying the user verification information and the preset verification information stored in the data recording end, and allowing the client to access if the user verification information passes verification;
and when the user verification information is dynamic verification information and biological verification information, taking a verification short message/verification mail issued before as part of the preset verification information, comparing and verifying the user verification information with the part of the preset verification information, and matching and verifying the user verification information with the other part of the preset verification information stored in the data recording terminal, wherein the client is allowed to access if the comparison verification and the matching verification are passed.
4. The multiple identity authentication method for rail transit crew of claim 2, wherein after the client is accessed, the client obtains the user right from the client, and displays the application module that the user has access to the client according to the user right, comprising:
after the client is accessed, extracting user roles and corresponding user permission levels from account information logged in by the client, screening all application modules according to the user permission levels, selecting the application modules which the user has access to, forming an accessible application list, and displaying the application modules which the user in the accessible application list has access to the client.
5. The rail transit crew's multiple identity authentication method of claim 4, wherein the generating and binding a data token with a validity period to the client, the bound client being allowed to freely access the application module during the validity period of the data token, comprises:
after any client is accessed, generating a data token with an expiration date, and binding the data token with the client;
allowing the bound client to freely access the application module during the validity period of the data token;
and when the validity period of the data token is exceeded, disconnecting the client and prompting the client to access again.
6. A multiple identity authentication device for rail transit crew comprising:
the user access module is configured to acquire a user login password, perform data processing on the user login password, perform matching verification on a processing result and a preset login password, acquire user verification information if the user login password passes the verification, perform matching verification on the user verification information and the preset verification information, and allow a client to access if the user login password passes the verification;
the application presentation module is configured to acquire user permission from the client after the client is accessed, and display an application module which a user has access to the client according to the user permission;
an access restriction module configured to generate and bind with the client a data token with a validity period within which the bound client is allowed to freely access the application module.
7. A terminal comprising a memory, a processor and a computer program stored in the memory and executable on the processor, wherein the processor when executing the computer program performs the steps in the method for multiple identity authentication of rail transit crew as claimed in any one of claims 1 to 5.
8. A computer-readable storage medium, in which a computer program is stored, which, when being executed by a processor, carries out the steps of the method for multiple identity authentication of rail transit crews according to any one of claims 1 to 5.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111683330.1A CN114329394A (en) | 2021-12-31 | 2021-12-31 | Multiple identity authentication method, device, terminal and storage medium for rail transit crew |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111683330.1A CN114329394A (en) | 2021-12-31 | 2021-12-31 | Multiple identity authentication method, device, terminal and storage medium for rail transit crew |
Publications (1)
Publication Number | Publication Date |
---|---|
CN114329394A true CN114329394A (en) | 2022-04-12 |
Family
ID=81021981
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111683330.1A Pending CN114329394A (en) | 2021-12-31 | 2021-12-31 | Multiple identity authentication method, device, terminal and storage medium for rail transit crew |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114329394A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115529175A (en) * | 2022-09-16 | 2022-12-27 | 曲誉环境综合治理有限公司 | Industrial equipment authentication login method and device |
CN116032758A (en) * | 2022-12-28 | 2023-04-28 | 中国联合网络通信集团有限公司 | Network equipment management and control method, device, equipment and storage medium |
CN116318914A (en) * | 2023-03-01 | 2023-06-23 | 华能信息技术有限公司 | Security policy matching authentication method and system |
CN118200058A (en) * | 2024-05-17 | 2024-06-14 | 广东省电信规划设计院有限公司 | Multi-factor authentication method and system based on physical isolation channel |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103390297A (en) * | 2012-05-08 | 2013-11-13 | 新谊整合科技股份有限公司 | Multiple security control security system and security information processing method |
CN107370765A (en) * | 2017-09-06 | 2017-11-21 | 郑州云海信息技术有限公司 | A kind of ftp server identity identifying method and system |
CN109587123A (en) * | 2018-11-21 | 2019-04-05 | 许继集团有限公司 | Double factor verification method and certificate server, biometric authentication service device |
CN111988338A (en) * | 2020-09-07 | 2020-11-24 | 华侨大学 | Permission-controllable Internet of things cloud platform based on block chain and data interaction method |
-
2021
- 2021-12-31 CN CN202111683330.1A patent/CN114329394A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103390297A (en) * | 2012-05-08 | 2013-11-13 | 新谊整合科技股份有限公司 | Multiple security control security system and security information processing method |
CN107370765A (en) * | 2017-09-06 | 2017-11-21 | 郑州云海信息技术有限公司 | A kind of ftp server identity identifying method and system |
CN109587123A (en) * | 2018-11-21 | 2019-04-05 | 许继集团有限公司 | Double factor verification method and certificate server, biometric authentication service device |
CN111988338A (en) * | 2020-09-07 | 2020-11-24 | 华侨大学 | Permission-controllable Internet of things cloud platform based on block chain and data interaction method |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115529175A (en) * | 2022-09-16 | 2022-12-27 | 曲誉环境综合治理有限公司 | Industrial equipment authentication login method and device |
CN116032758A (en) * | 2022-12-28 | 2023-04-28 | 中国联合网络通信集团有限公司 | Network equipment management and control method, device, equipment and storage medium |
CN116318914A (en) * | 2023-03-01 | 2023-06-23 | 华能信息技术有限公司 | Security policy matching authentication method and system |
CN118200058A (en) * | 2024-05-17 | 2024-06-14 | 广东省电信规划设计院有限公司 | Multi-factor authentication method and system based on physical isolation channel |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11838425B2 (en) | Systems and methods for maintaining decentralized digital identities | |
CN114329394A (en) | Multiple identity authentication method, device, terminal and storage medium for rail transit crew | |
CN111931144B (en) | Unified safe login authentication method and device for operating system and service application | |
US6928546B1 (en) | Identity verification method using a central biometric authority | |
CN108989278A (en) | Identification service system and method | |
CN110086608A (en) | User authen method, device, computer equipment and computer readable storage medium | |
US20070234067A1 (en) | Identity verfication method using a central biometric authority | |
EP1791073A1 (en) | Processing device, helper data generating device, terminal device, authentication device and biometrics authentication system | |
EP2442204A1 (en) | System and method for privilege delegation and control | |
US20210168148A1 (en) | Contextual scoring of authenticators | |
CN108684041A (en) | The system and method for login authentication | |
CN106790260A (en) | A kind of multiple-factor identity identifying method | |
JP2003534589A (en) | Authentication system and method | |
CN107196922A (en) | Identity identifying method, user equipment and server | |
AU2014262138A1 (en) | User authentication | |
CN105554018B (en) | Genuine cyber identification verification method | |
JP4857657B2 (en) | Access management system and access management method | |
KR102372503B1 (en) | Method for providing authentification service by using decentralized identity and server using the same | |
CN112383401B (en) | User name generation method and system for providing identity authentication service | |
US20080250245A1 (en) | Biometric-based document security | |
US20230208637A1 (en) | Key management method and apparatus | |
CN113826095A (en) | Single click login process | |
CN110995661B (en) | Network card platform | |
CN104657860A (en) | Mobile banking security authentication method | |
CN109522694A (en) | A kind of identification system based on computer network |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |