CN117668817A - Password modification method and device of target operating system and electronic equipment - Google Patents

Password modification method and device of target operating system and electronic equipment Download PDF

Info

Publication number
CN117668817A
CN117668817A CN202311560851.7A CN202311560851A CN117668817A CN 117668817 A CN117668817 A CN 117668817A CN 202311560851 A CN202311560851 A CN 202311560851A CN 117668817 A CN117668817 A CN 117668817A
Authority
CN
China
Prior art keywords
operating system
password
target
dynamic password
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311560851.7A
Other languages
Chinese (zh)
Inventor
叶建涛
姚志强
黄嘉荣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Industrial and Commercial Bank of China Ltd ICBC
Original Assignee
Industrial and Commercial Bank of China Ltd ICBC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Industrial and Commercial Bank of China Ltd ICBC filed Critical Industrial and Commercial Bank of China Ltd ICBC
Priority to CN202311560851.7A priority Critical patent/CN117668817A/en
Publication of CN117668817A publication Critical patent/CN117668817A/en
Pending legal-status Critical Current

Links

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention discloses a password modification method of a target operating system, a device thereof and electronic equipment, and relates to the field of information security, the field of financial science and technology or other related technical fields, wherein the password modification method comprises the following steps: acquiring system information of a target operating system of a password to be modified; generating a target dynamic password of a target operating system based on system information, and configuring effective duration for the target dynamic password; generating a password modification script based on the target dynamic password and the effective duration; and modifying the dynamic password of the target operating system by remotely scheduling and executing the password modification script. The invention solves the technical problems that in the related technology, the password of the operating system is manually modified by an administrator, the password modification efficiency is low, the password is not suitable for a scene of managing a large number of operating system passwords, and the security of the operating system is low due to a single fixed system password.

Description

Password modification method and device of target operating system and electronic equipment
Technical Field
The invention relates to the field of information security, financial science and technology or other related technical fields, in particular to a password modification method and device of a target operating system and electronic equipment.
Background
Along with the updating iteration of the information technology, in order to meet higher business requirements, large enterprises often need to deploy a large number of operating systems, the operating systems relate to Windows, linux, UOS, kylin and other operating systems, the operating systems are customized and developed by corresponding manufacturers, a large number of default passwords exist after project delivery is completed, and the system security is low.
Because the number of the systems is large and the requirements of each system on the complexity of the password are different, in the related technology, after the deployment of the operating system is completed, account passwords of the operating system are managed by operation and maintenance personnel, but a large number of system account passwords are passwords set in initial delivery, the passwords are not modified for a long time, for example, the passwords of the systems such as a virtualization platform CNA, an ESXI host and the like are not modified, and the password management problem has an increasing influence on the safety and usability of a large number of important operating systems in a development center along with personnel replacement and operation and maintenance document loss.
In view of the above problems, no effective solution has been proposed at present.
Disclosure of Invention
The embodiment of the invention provides a password modification method and device of a target operating system and electronic equipment, which at least solve the technical problems that in the related art, the password modification efficiency is low by manually modifying the password of the operating system by an administrator, the password modification method and device are not suitable for a scene of managing a large number of passwords of the operating system, and the security of the operating system is low due to a single fixed system password.
According to an aspect of the embodiment of the present invention, there is provided a password modification method of a target operating system, including: acquiring system information of a target operating system of a password to be modified, wherein the system information of the target operating system at least comprises: system identification, IP address, system type, account information and dynamic password of each account; generating a target dynamic password of the target operating system based on the system information, and configuring effective duration for the target dynamic password; generating a password modification script based on the target dynamic password and the effective duration; and modifying the dynamic password of the target operating system by remotely scheduling and executing the password modification script.
Optionally, the step of generating the target dynamic password of the target operating system based on the system information includes: randomly selecting a preset number of characters from the system identifier, and determining a password character string based on the randomly selected characters, password generation time and password generation times; encrypting the password character string to obtain an encrypted character string; and adjusting the encryption character string based on a preset password configuration rule to obtain the target dynamic password.
Optionally, before acquiring the system information of the target operating system of the password to be modified, the method further includes: responding to an operating system registration request submitted by an administrator terminal, and registering an operating system, wherein the operating system registration request carries system information of the operating system; and storing the registered system information of the operating system into a database, and monitoring the registered operating system.
Optionally, the step of generating a password modification script based on the target dynamic password and the valid duration comprises: acquiring a script template corresponding to the target operating system from a database based on the system type; and generating the password modification script based on the target dynamic password, the effective duration and the script template.
Optionally, the step of modifying the dynamic password of the target operating system by executing the password modification script through remote scheduling includes: remotely synchronizing the password modification script into the target operating system based on the IP address and the account information; executing the password modification script, logging in the target operating system, and modifying the dynamic password of the target operating system.
Optionally, after modifying the dynamic password of the target operating system, the method further includes: verifying the target dynamic password to obtain a verification result; storing the target dynamic password of the target operating system to a database and recording audit information under the condition that the verification result indicates that the target dynamic password passes verification, wherein the audit information is log information generated by executing corresponding actions on each operating system, and the audit information at least comprises: the system identification of the operating system, the IP address of the operating system, the system type of the operating system, the account information, the dynamic password of the operating system, the use condition of the dynamic password of the operating system, the application times of the dynamic password of the operating system and the usable time of the dynamic password of the operating system.
Optionally, after modifying the dynamic password of the target operating system, the method further includes: receiving a system access list sent by a user side, wherein the system access list at least comprises: the system identification corresponding to the operating system to be accessed by the user side, the IP address corresponding to the operating system to be accessed by the user side, the account information, the access reason and the access duration application; and carrying out authentication processing on the user terminal to obtain an authentication result, wherein the authentication processing at least comprises the following steps: authenticating whether the system access ticket is valid or not, and authenticating whether the user has an operating system access right or not; and under the condition that the authentication result indicates that the user side passes authentication, returning a dynamic password corresponding to the operating system to be accessed to the user side, and recording audit information.
Optionally, the password modification method of the target operating system further includes: calling audit information of the operating system, taking the operating system as the target operating system and modifying the dynamic password of the target operating system under the condition that the available time length of the dynamic password of the operating system is equal to a preset value; and marking the operating system as an abnormal operating system under the condition that the dynamic password application times of the operating system is greater than or equal to a preset application times threshold value, generating abnormal alarm information based on the abnormal operating system, and sending the abnormal alarm information to an administrator terminal.
According to another aspect of the embodiment of the present invention, there is also provided a password modification apparatus of a target operating system, including: the system information of the target operating system at least comprises: system identification, IP address, system type, account information and dynamic password of each account; the configuration unit is used for generating a target dynamic password of the target operating system based on the system information and configuring effective duration for the target dynamic password; the generation unit is used for generating a password modification script based on the target dynamic password and the effective duration; and the modification unit is used for executing the password modification script through remote scheduling and modifying the dynamic password of the target operating system.
Optionally, the configuration unit includes: the first selection module is used for randomly selecting a preset number of characters from the system identifier and determining a password character string based on the randomly selected characters, the password generation time and the password generation times; the first encryption module is used for encrypting the password character string to obtain an encrypted character string; and the first adjusting module is used for adjusting the encryption character string based on a preset password configuration rule to obtain the target dynamic password.
Optionally, the password modification device of the target operating system further includes: the first registration module is used for responding to an operation system registration request submitted by an administrator terminal and registering an operation system, wherein the operation system registration request carries system information of the operation system; the first storage module is used for storing the registered system information of the operating system into a database and monitoring the registered operating system.
Optionally, the generating unit includes: the first acquisition module is used for acquiring a script template corresponding to the target operating system from a database based on the system type; the first generation module is used for generating the password modification script based on the target dynamic password, the effective duration and the script template.
Optionally, the modification unit includes: the first synchronization module is used for remotely synchronizing the password modification script into the target operating system based on the IP address and the account information; the first modification module is used for executing the password modification script, logging in the target operating system and modifying the dynamic password of the target operating system.
Optionally, the password modification device of the target operating system further includes: the first verification module is used for verifying the target dynamic password to obtain a verification result; the first recording module is used for storing the target dynamic password of the target operating system to a database and recording audit information under the condition that the verification result indicates that the target dynamic password passes verification, wherein the audit information is log information generated by executing corresponding actions on each operating system, and the audit information at least comprises: the system identification of the operating system, the IP address of the operating system, the system type of the operating system, the account information, the dynamic password of the operating system, the use condition of the dynamic password of the operating system, the application times of the dynamic password of the operating system and the usable time of the dynamic password of the operating system.
Optionally, the password modification device of the target operating system further includes: the first receiving module is configured to receive a system access ticket sent by a user terminal, where the system access ticket at least includes: the system identification corresponding to the operating system to be accessed by the user side, the IP address corresponding to the operating system to be accessed by the user side, the account information, the access reason and the access duration application; the first authentication module is used for carrying out authentication processing on the user side to obtain an authentication result, wherein the authentication processing at least comprises: authenticating whether the system access ticket is valid or not, and authenticating whether the user has an operating system access right or not; and the first return module is used for returning a dynamic password corresponding to the operating system to be accessed to the user side and recording audit information under the condition that the authentication result indicates that the user side passes the authentication.
Optionally, the password modification device of the target operating system further includes: the first calling module is used for calling audit information of the operating system, taking the operating system as the target operating system and modifying the dynamic password of the target operating system when the usable time length of the dynamic password of the operating system is equal to a preset value; the first marking module is used for marking the operating system as an abnormal operating system under the condition that the dynamic password application frequency of the operating system is greater than or equal to a preset application frequency threshold value, generating abnormal alarm information based on the abnormal operating system, and sending the abnormal alarm information to an administrator terminal.
According to another aspect of the embodiment of the present invention, there is further provided a computer readable storage medium, where the computer readable storage medium includes a stored computer program, and when the computer program runs, the device where the computer readable storage medium is controlled to execute the method for modifying a password of any one of the above-mentioned project label operating systems.
According to another aspect of the embodiments of the present invention, there is further provided an electronic device, including one or more processors and a memory, where the memory is configured to store one or more programs, and when the one or more programs are executed by the one or more processors, the one or more processors are caused to implement the method for modifying a password of any one of the project label operating systems described above.
In the present disclosure, the method comprises the following steps: firstly, acquiring system information of a target operating system of a password to be modified, wherein the system information of the target operating system at least comprises: the method comprises the steps of generating a target dynamic password of a target operating system based on system information, configuring effective time for the target dynamic password, generating a password modification script based on the target dynamic password and the effective time, and finally modifying the dynamic password of the target operating system by executing the password modification script through remote scheduling.
In the method, when a large number of passwords of the operating system are managed, a password modification script corresponding to the target operating system is generated according to the automatically generated dynamic passwords, the password modification script is executed in a remote scheduling mode, the target operating system is automatically logged in to carry out password modification, the problem that effective maintenance is difficult to carry out by manpower is avoided, and the safety of the operating system is improved in the mode of automatically generating random dynamic passwords, so that the technical problem that in the related art, the password of the operating system is manually modified by an administrator, the password modification efficiency is low, the password modification script is not suitable for a scene of managing the passwords of the large number of operating systems, and the operating system safety is low due to the fact that a single fixed system password is adopted.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this application, illustrate embodiments of the invention and together with the description serve to explain the invention and do not constitute a limitation on the invention. In the drawings:
FIG. 1 is a flow chart of an alternative password modification method of a target operating system in accordance with an embodiment of the invention;
FIG. 2 is a schematic diagram of an alternate operating system password modification flow in accordance with an embodiment of the invention;
FIG. 3 is a schematic diagram of an alternate operating system password application flow in accordance with an embodiment of the invention;
FIG. 4 is a schematic diagram of an alternative operating system audit process according to an embodiment of the present invention;
FIG. 5 is a schematic diagram of an alternative target operating system password modification device in accordance with an embodiment of the invention;
fig. 6 is a block diagram of a hardware configuration of an electronic device (or mobile device) of a password modification method of a target operating system according to an embodiment of the present invention.
Detailed Description
In order that those skilled in the art will better understand the present invention, a technical solution in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in which it is apparent that the described embodiments are only some embodiments of the present invention, not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the present invention without making any inventive effort, shall fall within the scope of the present invention.
It should be noted that the terms "first," "second," and the like in the description and the claims of the present invention and the above figures are used for distinguishing between similar objects and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged where appropriate such that the embodiments of the invention described herein may be implemented in sequences other than those illustrated or otherwise described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
To facilitate an understanding of the invention by those skilled in the art, some terms or nouns involved in the various embodiments of the invention are explained below:
the abbreviation UOS, unified Operating System, a computer operating system;
abbreviation form of virtualization platform CAN, container as a Node, a container-based virtualization platform;
an ESXI host, a host technology for constructing and managing a virtualized environment, can deploy a plurality of virtual machines on a physical server;
a Web page, a page displayed in a Web browser;
MD5 encryption, an abbreviated form of Message Digest Algorithm, a hash algorithm converts incoming data into a hash value of fixed length.
It should be noted that, the method and the device for modifying the password of the target operating system in the present disclosure may be used in the information security field when the dynamic password of the target operating system is modified based on remote scheduling, and may also be used in any field other than the information security field when the dynamic password of the target operating system is modified based on remote scheduling.
It should be noted that, related information (including but not limited to user equipment information, user personal information, etc.) and data (including but not limited to data for analysis, stored data, presented data, etc.) related to the present disclosure are information and data authorized by a user or sufficiently authorized by each party, and the collection, use and processing of related data need to comply with related laws and regulations and standards of related countries and regions, and be provided with corresponding operation entries for the user to select authorization or rejection. For example, an interface is provided between the system and the relevant user or institution, before acquiring the relevant information, the system needs to send an acquisition request to the user or institution through the interface, and acquire the relevant information after receiving the consent information fed back by the user or institution.
The following embodiments of the present invention are applicable to various password management systems/applications/devices. According to the invention, the corresponding operating system modification password is remotely scheduled based on the password modification script, the dynamic password is generated based on the preset password generation rule, the effective duration is configured by the dynamic password, the new dynamic password is automatically modified after the expiration of the effective duration, the safety of the operating system is ensured, the password is automatically modified through the password modification script, and the password modification efficiency is improved.
The invention adds a verification mechanism to the modified password, thereby avoiding the situation that the operating system cannot log in due to error modification or manual modification of the forgotten password.
The present invention will be described in detail with reference to the following examples.
Example 1
According to an embodiment of the present invention, there is provided an embodiment of a password modification method of a target operating system, it should be noted that the steps shown in the flowchart of the drawings may be performed in a computer system such as a set of computer executable instructions, and that although a logical order is shown in the flowchart, in some cases the steps shown or described may be performed in an order different from that herein.
FIG. 1 is a flowchart of an alternative method of password modification for a target operating system, according to an embodiment of the invention, as shown in FIG. 1, the method comprising the steps of:
step S101, acquiring system information of a target operating system to be modified, where the system information of the target operating system at least includes: system identification, IP address, system type, account information and dynamic password of each account;
step S102, generating a target dynamic password of a target operating system based on system information, and configuring effective duration for the target dynamic password;
Step S103, generating a password modification script based on the target dynamic password and the effective duration;
step S104, the dynamic password of the target operating system is modified by executing the password modification script through remote scheduling.
Through the steps, firstly, the system information of the target operating system of the password to be modified is obtained, wherein the system information of the target operating system at least comprises: the method comprises the steps of generating a target dynamic password of a target operating system based on system information, configuring effective time for the target dynamic password, generating a password modification script based on the target dynamic password and the effective time, and finally modifying the dynamic password of the target operating system by executing the password modification script through remote scheduling.
In this embodiment, when managing passwords of a large number of operating systems, a password modification script corresponding to a target operating system is generated according to an automatically generated dynamic password, and the password modification script is executed in a remote scheduling manner, so that the problem that the password modification is difficult to be effectively maintained by manual operation is avoided, and the security of the operating system is improved in a manner of automatically generating a random dynamic password, so that the technical problem that in the related art, the password modification efficiency is low and is not suitable for a scene of managing passwords of a large number of operating systems due to the fact that an administrator manually modifies the passwords of the operating systems is solved, and the security of the operating system is low due to a single fixed system password is solved.
Embodiments of the present invention will be described in detail with reference to the following steps.
It should be noted that, with rapid development of information technology and artificial intelligence, in order to better develop online services, large enterprises often need to deploy massive operating systems on computers, support client service development, and the operating systems include, but are not limited to: the Windows system, linux system, UOS system, kylin system, each operating system is different in type, executing business is different, security requirement to the system is different, because the number of operating systems is large, account passwords of a large number of systems are all delivered as initial passwords, security is not high, password modification is often based on user change, once user has replacement, or operation and maintenance document is lost, correct system login passwords cannot be obtained, and the situation that the user cannot log in the operating system is caused.
It should be noted that, the embodiment of the invention introduces a dynamic password modification mechanism, and automatically modifies the login password of the operating system in a remote call manner, the implementation subject of the embodiment of the invention is a password management system, the password management system can remotely manage a plurality of operating systems, modify the dynamic password for the operating system, respond to the system access request of the applicant, and record the password modification and audit information generated by the user accessing the operating system, so as to facilitate the identification of abnormal conditions of the operating system, thereby improving the security of the operating system based on the randomly generated dynamic password, and avoiding the situation that the system cannot log in due to factors such as personnel replacement and password forgetting by remotely scheduling the operating system based on the password management system.
Optionally, before acquiring the system information of the target operating system of the password to be modified, the method further includes: responding to an operating system registration request submitted by an administrator terminal, and registering an operating system, wherein the operating system registration request carries system information of the operating system; and storing the system information of the registered operating system into a database, and monitoring the registered operating system.
Before the operating system is managed, the scheduling authority of the target operating system needs to be obtained, so that massive operating systems need to be registered in the password management system, the system is registered in response to a system registration request sent by an administrator terminal, system information of the operating system is stored in a database, and meanwhile, an IP address of the operating system is added into a monitoring module to monitor the newly registered operating system in real time.
In addition, when registering, the system information of the operating system submitted by the administrator through the web page is shown in table 1:
table 1 system information of operating system
As shown in table 1, the system information submitted by the administrator at the time of registration includes: serial number, system identification, IP address, system type, version number, account name 1, initial password 1 (one operating system may register multiple accounts, corresponding to multiple initial passwords, the number of accounts of each operating system is not limited in the embodiment of the present invention).
Step S101, system information of a target operating system of a password to be modified is acquired.
It should be noted that, the operating system refers to a computer operating system deployed on a client (desktop, notebook, tablet, etc.) or a server, and the target operating system to be modified includes: the password of the new operating system registered in the password management system is the initial password in delivery, the initial password is required to be modified, the security of the target operating system is improved, or the dynamic password of the operating system has a valid period when the dynamic password expires, and the dynamic password of the operating system is required to be updated in real time after the valid period of the dynamic password is exceeded.
It should be noted that, the system information of the target operating system at least includes: the system identification, IP address, system type, account information and dynamic password for each account, which is the initial password for the newly registered operating system.
Step S102, a target dynamic password of a target operating system is generated based on the system information, and the effective duration is configured for the target dynamic password.
It should be noted that the present invention configures a dynamic password generation mechanism for each operating system, and uses the dynamic password to update the login password of the operating system in real time, thereby improving confidentiality and security of the operating system.
Optionally, the step of generating the target dynamic password of the target operating system based on the system information includes: randomly selecting a preset number of characters from the system identifier, and determining a password character string based on the randomly selected characters, the password generation time and the password generation times; encrypting the password character string to obtain an encrypted character string; and adjusting the encrypted character string based on a preset password configuration rule to obtain the target dynamic password.
In the process of generating the dynamic password, firstly, randomly selecting a preset number of characters from a system identifier, then generating a password character string according to the selected characters, time data when the dynamic password is generated and the dynamic password modification times of the operating system, encrypting the password character string by adopting an encryption algorithm to obtain an encrypted character string, and finally adjusting the encrypted character string according to a preset password configuration rule to obtain the target dynamic password.
An optional password string generation method includes: based on the system identifier, four characters are randomly selected (the number of the selected characters can be other preset numbers, the embodiment of the invention does not limit the number of the randomly selected characters), the selected four characters are spliced with the current password generation time and the dynamic password modification times of the operating system to obtain a password character string, for example, four characters 'JD 03' are randomly selected from the system identifier 'JDNF 5488CNA 03', and are spliced with the password generation time '202209271314' and the dynamic password modification times '1', so as to obtain the password character string 'JD 032022092713141'.
An optional method for acquiring an encrypted character string includes: encryption calculation is performed through an MD5 encryption algorithm to obtain an encrypted character string, for example, encryption calculation is performed on the encrypted character string 'JD 032022092713141' through MD5 to obtain an encrypted character string '1 FC758C2A12AED 99'.
An optional password configuration rule includes: randomly selecting a first preset number of characters from the encrypted character string, converting the lower case form of the selected characters into the upper case form, randomly selecting a second preset number of characters from the encrypted character string, converting the upper case form of the selected characters into the lower case form, finally selecting a one-bit characteristic symbol, and splicing the one-bit characteristic symbol to obtain a target dynamic password, for example: randomly selecting 6 bits (the lower case character is converted into the upper case form) from the encrypted character string, then randomly selecting 5 bits (the upper case character is converted into the lower case form), and finally randomly selecting 1 special symbol to obtain the target dynamic password' FC781 ace 91! ".
After the target dynamic password is obtained, the effective duration needs to be configured for the target dynamic password, and when the dynamic password fails, a new dynamic password needs to be generated and the original dynamic password of the operating system needs to be modified.
Step S103, generating a password modification script based on the target dynamic password and the effective duration.
Optionally, the step of generating the password modification script based on the target dynamic password and the validity period comprises: acquiring a script template corresponding to a target operating system from a database based on the system type; a password modification script is generated based on the target dynamic password, the effective duration, and the script template.
It should be noted that, in the embodiment of the present invention, script templates for password modification are preconfigured for different types of operating systems, and variables in the script templates are modified by the generated target dynamic password and the effective duration of the dynamic password, so as to generate a password modification script, for example:
#cat/tmp/T_infor.txt
192.168.2.1root Password12#$FC781Acae91!
192.168.2.3root Password12#$FC781Acae92@;
step S104, the dynamic password of the target operating system is modified by executing the password modification script through remote scheduling.
It should be noted that, in the embodiment of the present invention, the password of the operating system may be modified by using a Python remote call mechanism, the IP address information is obtained according to the target operating system, the script for modifying the password is executed, the generated dynamic password is validated in the target operating system and recorded in the database, and the script for modifying the password is mainly divided into two types: shell scripts of Linux and bat scripts of Windows.
Optionally, the step of modifying the dynamic password of the target operating system by executing the password modification script through remote scheduling includes: remotely synchronizing the password modification script into the target operating system based on the IP address and the account information; executing the password modification script, logging in the target operating system, and modifying the dynamic password of the target operating system.
In the embodiment of the invention, in the process of remotely modifying the password, the password modification script is remotely synchronized to the related folder related to the password modification in the target operating system based on the IP address and the account information, and the password modification script is automatically executed through the related instruction to modify the dynamic password of the operating system and modify the original dynamic password into the target dynamic password.
It should be noted that the above-mentioned procedure of modifying the password is implemented by Python, and the code logic is exemplified as follows:
1) Reading a password modification script;
2) Defining a variable management server IP;
3) Adding system information of target operations of a plurality of passwords to be modified into a loop body;
4) Modifying the password of the target operating system into a target dynamic password according to the remote scheduling instruction of the IP address of the corresponding operating system in the loop body (for example, the remote scheduling instruction of the linux operating system is a passwd command);
5) Finishing the modification and printing out a modification result;
6) The management server records a modification log chpw.log;
7) And extracting audit data from the modification log chpw.log, and writing the audit data into an audit management database through a Python call database interface.
Optionally, after modifying the dynamic password of the target operating system, the method further comprises: verifying the target dynamic password to obtain a verification result; storing the target dynamic password of the target operating system to a database and recording audit information under the condition that the verification result indicates that the target dynamic password passes verification, wherein the audit information is log information generated by executing corresponding actions on each operating system, and at least comprises: the method comprises the steps of operating system identification, operating system IP address, operating system type, account information, operating system dynamic password use condition, operating system dynamic password application times and operating system dynamic password usable time.
It should be noted that, after the password of the operating system is modified, the password is also required to be checked, for example, whether the target dynamic password can normally log in the operating system or whether the target dynamic password can complete interactive login is checked, and if the verification is passed, the target dynamic password is recorded in the database, and audit data in the password modification process is recorded.
It should be noted that, the audit information is used for the auditor to multiplex according to the data, and analyze whether the operating system has abnormal login, for example, when a certain unusual operating system is frequently applied for multiple times for accessing the dynamic password, an abnormal situation may exist, and because the action of applying for access each time can be regarded as audit data record, the abnormal situation can be found by calling the audit information.
It should be noted that, the audit information at least includes: the method comprises the steps of operating system identification, operating system IP address, operating system type, account information, operating system dynamic password use condition, operating system dynamic password application times and operating system dynamic password usable time.
Optionally, after modifying the dynamic password of the target operating system, the method further comprises: receiving a system access list sent by a user side, wherein the system access list at least comprises: the method comprises the steps of system identification corresponding to an operating system to be accessed by a user side, IP address corresponding to the operating system to be accessed by the user side, account information, access reasons and access duration application; and carrying out authentication processing on the user terminal to obtain an authentication result, wherein the authentication processing at least comprises the following steps: whether the authentication system access list is valid or not, and whether the authentication user terminal has the access right of the operating system or not; and under the condition that the authentication result indicates that the user side passes the authentication, returning a dynamic password corresponding to the operating system to be accessed to the user side, and recording audit information.
In the embodiment of the invention, the password management system automatically manages the password of the operating system, so when a user needs to log in the operating system to execute corresponding operation, the user needs to submit a system access list to the password management system, the system access list comprises the related information of the operating system to be accessed by the user side and the access reason of the user side, the access duration is applied, the user submits the access application list, the password management system firstly needs to check the validity of the information submitted by the user side and authenticate the access authority of the user, and the corresponding dynamic password is returned to the user under the condition that the authentication check is passed for two times.
Optionally, the password modification method of the target operating system further includes: calling audit information of an operating system, taking the operating system as a target operating system and modifying the dynamic password of the target operating system under the condition that the usable time length of the dynamic password of the operating system is equal to a preset value; and under the condition that the dynamic password application times of the operating system is greater than or equal to a preset application times threshold value, marking the operating system as an abnormal operating system, generating abnormal alarm information based on the abnormal operating system, and sending the abnormal alarm information to an administrator terminal.
It should be noted that, in the process of performing password management on a massive operating system, the embodiment of the invention calls the audit information of the operating system based on the preset time, checks the available time length of the dynamic surface of the operating system, and when the available time length is smaller than or equal to the preset value (for example, the available time length is 0 or the available time length is smaller than 0.5 hours), generates a new dynamic password again for the operating system with the dynamic password failure.
By analyzing the audit information, when the number of dynamic password application times of a certain operating system is greater than the preset application times threshold value of the system, the operating system is marked as an abnormal operating system, and abnormal alarm information is generated according to the abnormal condition of the operating system and the system information and is sent to an administrator terminal.
The following detailed description is directed to alternative embodiments.
Fig. 2 is a schematic diagram of a password modification flow of an optional operating system according to an embodiment of the present invention, where, as shown in fig. 2, the password management system may remotely call the operating system to modify a password of the operating system, where the operating system includes a Windows system, a Linux system, and the like, and the password management system includes a password modification module, a verification module, a password management module, and an audit module, where the password modification module is configured to generate a dynamic password and remotely modify the dynamic password of the operating system, the verification module is configured to verify whether a modified target dynamic password is valid, the password management module is configured to manage password information, and the audit module is configured to manage audit information.
The password modification flow of the operating system comprises the following steps:
step one, a password modification module determines a target operating system of a password to be modified, and generates a target dynamic password according to related information of the target operating system;
generating a password modification script based on the target dynamic password;
thirdly, synchronizing the password modification script into the operating system based on the Python code by the password modification module, executing the password modification script according to the operation instruction, and remotely logging in the target operating system to modify the dynamic password;
and step four, a verification module is called to verify the modified target dynamic password, for example, whether the target dynamic password can normally log in an operating system, whether interactive login can be completed or not, and the like.
And fifthly, if the verification is passed, storing the target dynamic password into a database, and recording the audit information of the password modification.
Fig. 3 is a schematic diagram of a password application flow of an optional operating system according to an embodiment of the present invention, as shown in fig. 3, a user side (for example, an operation and maintenance person, a service person, etc.) applies for a dynamic password of an operating system to be accessed to a password management system through a web page, the user side is a terminal where the operation and maintenance person and the service person are located, the user side submits a system access ticket to the web page, authentication is performed through an authentication module, and if the authentication passes, a required dynamic password is returned to the user side through the web page, and audit information related to the password application is recorded by an audit module.
The password application flow of the operating system is as follows:
step one, an applicant submits a system identifier corresponding to an operating system to be accessed, an IP address corresponding to the operating system to be accessed, account information, an access reason and an application access time length (the maximum time length is not more than 72 hours) on a Web page;
step two, invoking an authentication module to authenticate the applicant, wherein the authentication processing at least comprises: whether the authentication system access ticket is valid or not, whether the authentication applicant has access rights to the operating system or not;
and step three, returning request information to the Web page, wherein the request information contains the dynamic password recorded in the database, and then returning the dynamic password to the user side by the Web page.
Calling an audit module, and recording audit information of the action of the application, wherein the audit information is exemplified as follows:
table 2 audit information from password application operations
As shown in table 2, the audit information records the system information of the operating system, also records the use state of the current dynamic password, the application times and the expiration time of the current application password, and when the expiration time of the password is 0, the user does not have the access right of the system, and needs to submit the system access list again for application.
When a plurality of applicants apply for using the dynamic password, if the A applicant applies for the root account for expiration in 24 hours, the B applicant applies for the root account for 3 hours of validity period after 2 hours, namely, for the same account, different application batches, the application time periods have complete overlapping parts, and the dynamic password does not need to be recovered in the middle; and recording the total application times, recording the longest expiration time in the audit information, wherein the audit information is recorded as follows:
TABLE 3 audit information of complete coincidence of application times of different applicant
If the A applicant applies for the root account for expiration in 24 hours, and the B applicant applies for the root account for 5 hours of validity period after the A applicant applies for 20 hours, namely, in the same account, different application batches and different application time periods, the password is required to be recovered according to the password recovery process after the A applicant applies for the password expiration; and updating information in the management database according to the new validity period and the dynamic password, when the validity period of the password is invalid, the new modified dynamic password is required to be sent to the applicant who has applied for the account and has not expired, and the audit information is updated as follows:
TABLE 4 audit information of incomplete coincidence of application times of different applicant
FIG. 4 is a schematic diagram of an alternative operating system audit flow according to an embodiment of the present invention, as shown in FIG. 4, where an administrator terminal, where an auditor is located, invokes audit information to an audit module of the password management system by submitting an audit request to a Web page.
The operating system audit flow comprises the following steps:
step one, an auditor submits an audit request to a password management system through a Web page;
step two, the password management system returns related data to the manager terminal through the Web page, and the returned audit data are exemplified as follows:
table 5 audit information output to auditors
Thirdly, audit personnel export audit information by one key on a Web page and analyze the audit data, for example, for an operating system shown by a sequence number 2 in table 1, the audit personnel are applied to access 64 times in a certain time period, and if abnormal login is possible, a monitoring log of the operating system can be obtained and the actual condition of the system is analyzed.
In the embodiment of the invention, the corresponding operating system modification password is remotely scheduled based on the password modification script, the dynamic password is generated based on the preset password generation rule, the effective duration is configured by the dynamic password, the new dynamic password is automatically modified after the expiration of the effective duration, the safety of the operating system is ensured, the password is automatically modified through the password modification script, the password modification efficiency is improved, and meanwhile, the embodiment of the invention adds a verification mechanism to the modified password, so that the condition that the operating system cannot log in due to error modification or manual modification of the forgotten password is avoided.
The following describes in detail another embodiment.
Example two
The password modifying device of the target operating system provided in the present embodiment includes a plurality of implementation units, each of which corresponds to each implementation step in the first embodiment.
FIG. 5 is a schematic diagram of an alternative password modification device of a target operating system according to an embodiment of the invention, as shown in FIG. 5, the password modification device of the target operating system includes: an acquisition unit 51, a configuration unit 52, a generation unit 53, a modification unit 54, wherein,
an obtaining unit 51, configured to obtain system information of a target operating system of a password to be modified, where the system information of the target operating system at least includes: system identification, IP address, system type, account information and dynamic password of each account;
a configuration unit 52, configured to generate a target dynamic password of the target operating system based on the system information, and configure a valid duration for the target dynamic password;
a generation unit 53 for generating a password modification script based on the target dynamic password and the valid time period;
and the modification unit 54 is used for modifying the dynamic password of the target operating system by executing the password modification script through remote scheduling.
In the above-mentioned password modification apparatus of the target operating system, the obtaining unit 51 obtains the system information of the target operating system to be password modified, where the system information of the target operating system at least includes: system identification, IP address, system type, account information and dynamic password of each account; generating a target dynamic password of a target operating system based on system information through a configuration unit 52, and configuring effective duration for the target dynamic password; generating, by the generating unit 53, a password modification script based on the target dynamic password and the valid time period; the dynamic password of the target operating system is modified by the modification unit 54 executing the password modification script through remote scheduling.
In this embodiment, when managing passwords of a large number of operating systems, a password modification script corresponding to a target operating system is generated according to an automatically generated dynamic password, and the password modification script is executed in a remote scheduling manner, so that the problem that the password modification is difficult to be effectively maintained by manual operation is avoided, and the security of the operating system is improved in a manner of automatically generating a random dynamic password, so that the technical problem that in the related art, the password modification efficiency is low and is not suitable for a scene of managing passwords of a large number of operating systems due to the fact that an administrator manually modifies the passwords of the operating systems is solved, and the security of the operating system is low due to a single fixed system password is solved.
Optionally, the configuration unit includes: the first selection module is used for randomly selecting a preset number of characters from the system identifier and determining a password character string based on the randomly selected characters, the password generation time and the password generation times; the first encryption module is used for encrypting the password character string to obtain an encrypted character string; and the first adjusting module is used for adjusting the encrypted character string based on a preset password configuration rule to obtain the target dynamic password.
Optionally, the password modification device of the target operating system further includes: the first registration module is used for responding to an operation system registration request submitted by the administrator terminal and registering an operation system, wherein the operation system registration request carries system information of the operation system; and the first storage module is used for storing the system information of the registered operating system into a database and monitoring the registered operating system.
Optionally, the generating unit includes: the first acquisition module is used for acquiring a script template corresponding to the target operating system from the database based on the system type; the first generation module is used for generating a password modification script based on the target dynamic password, the effective duration and the script template.
Optionally, the modification unit includes: the first synchronization module is used for remotely synchronizing the password modification script into the target operating system based on the IP address and the account information; the first modification module is used for executing the password modification script, logging in the target operating system and modifying the dynamic password of the target operating system.
Optionally, the password modification device of the target operating system further includes: the first verification module is used for verifying the target dynamic password to obtain a verification result; the first recording module is used for storing the target dynamic password of the target operating system to the database and recording audit information under the condition that the verification result indicates that the target dynamic password passes the verification, wherein the audit information is log information generated by executing corresponding actions on each operating system, and at least comprises: the method comprises the steps of operating system identification, operating system IP address, operating system type, account information, operating system dynamic password use condition, operating system dynamic password application times and operating system dynamic password usable time.
Optionally, the password modification device of the target operating system further includes: the first receiving module is configured to receive a system access ticket sent by a user terminal, where the system access ticket at least includes: the method comprises the steps of system identification corresponding to an operating system to be accessed by a user side, IP address corresponding to the operating system to be accessed by the user side, account information, access reasons and access duration application; the first authentication module is used for carrying out authentication processing on the user side to obtain an authentication result, wherein the authentication processing at least comprises: whether the authentication system access list is valid or not, and whether the authentication user terminal has the access right of the operating system or not; the first return module is used for returning the dynamic password corresponding to the operating system to be accessed to the user terminal and recording the audit information under the condition that the authentication result indicates that the user terminal passes the authentication.
Optionally, the password modification device of the target operating system further includes: the first calling module is used for calling audit information of the operating system, taking the operating system as a target operating system and modifying the dynamic password of the target operating system under the condition that the usable time length of the dynamic password of the operating system is equal to a preset value; the first marking module is used for marking the operating system as an abnormal operating system under the condition that the dynamic password application frequency of the operating system is greater than or equal to a preset application frequency threshold value, generating abnormal alarm information based on the abnormal operating system and sending the abnormal alarm information to the manager terminal.
The password modifying apparatus of the target operating system may further include a processor and a memory, wherein the acquiring unit 51, the configuring unit 52, the generating unit 53, the modifying unit 54, and the like are stored as program units in the memory, and the processor executes the program units stored in the memory to realize corresponding functions.
The processor includes a kernel, and the kernel fetches a corresponding program unit from the memory. The kernel may be provided with one or more kernel parameters to manage the dynamic passwords of the operating system.
The memory may include volatile memory in a computer-readable medium, random Access Memory (RAM) and/or nonvolatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM), which includes at least one memory chip.
According to another aspect of the embodiment of the present invention, there is further provided a computer readable storage medium, where the computer readable storage medium includes a stored computer program, and when the computer program runs, the device on which the computer readable storage medium is located is controlled to execute the password modification method of any one of the project label operating systems described above.
According to another aspect of the embodiments of the present invention, there is further provided an electronic device, including one or more processors and a memory, where the memory is configured to store one or more programs, and the one or more programs, when executed by the one or more processors, cause the one or more processors to implement the method for modifying a password of any of the aforementioned project label operating systems.
The present application also provides a computer program product adapted to perform, when executed on a data processing device, a program initialized with the method steps of: acquiring system information of a target operating system of a password to be modified, wherein the system information of the target operating system at least comprises: system identification, IP address, system type, account information and dynamic password of each account; generating a target dynamic password of a target operating system based on system information, and configuring effective duration for the target dynamic password; generating a password modification script based on the target dynamic password and the effective duration; and modifying the dynamic password of the target operating system by remotely scheduling and executing the password modification script.
Fig. 6 is a block diagram of a hardware configuration of an electronic device (or mobile device) of a password modification method of a target operating system according to an embodiment of the present invention. As shown in fig. 6, the electronic device may include one or more processors 602 (shown in fig. 6 as 602a, 602b, … …,602 n) (the processor 602 may include, but is not limited to, a microprocessor MCU, a programmable logic device FPGA, etc.) and a memory 604 for storing data. In addition, the method may further include: a display, an input/output interface (I/O interface), a Universal Serial Bus (USB) port (which may be included as one of the ports of the I/O interface), a network interface, a keyboard, a power supply, and/or a camera. It will be appreciated by those of ordinary skill in the art that the configuration shown in fig. 6 is merely illustrative and is not intended to limit the configuration of the electronic device described above. For example, the electronic device may also include more or fewer components than shown in FIG. 6, or have a different configuration than shown in FIG. 6.
The foregoing embodiment numbers of the present invention are merely for the purpose of description, and do not represent the advantages or disadvantages of the embodiments.
In the foregoing embodiments of the present invention, the descriptions of the embodiments are emphasized, and for a portion of this disclosure that is not described in detail in this embodiment, reference is made to the related descriptions of other embodiments.
In the several embodiments provided in the present application, it should be understood that the disclosed technology content may be implemented in other manners. The above-described embodiments of the apparatus are merely exemplary, and the division of the units, for example, may be a logic function division, and may be implemented in another manner, for example, a plurality of units or components may be combined or may be integrated into another system, or some features may be omitted, or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be through some interfaces, units or modules, or may be in electrical or other forms.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in the embodiments of the present invention may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit. The integrated units may be implemented in hardware or in software functional units.
The integrated units, if implemented in the form of software functional units and sold or used as stand-alone products, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention may be embodied essentially or in part or all of the technical solution or in part in the form of a software product stored in a storage medium, including instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to perform all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a Read-Only Memory (ROM), a random access Memory (RAM, random Access Memory), a removable hard disk, a magnetic disk, or an optical disk, or other various media capable of storing program codes.
The foregoing is merely a preferred embodiment of the present invention and it should be noted that modifications and adaptations to those skilled in the art may be made without departing from the principles of the present invention, which are intended to be comprehended within the scope of the present invention.

Claims (11)

1. A method for modifying a password of a target operating system, comprising:
acquiring system information of a target operating system of a password to be modified, wherein the system information of the target operating system at least comprises: system identification, IP address, system type, account information and dynamic password of each account;
generating a target dynamic password of the target operating system based on the system information, and configuring effective duration for the target dynamic password;
generating a password modification script based on the target dynamic password and the effective duration;
and modifying the dynamic password of the target operating system by remotely scheduling and executing the password modification script.
2. The password modification method of claim 1, wherein the step of generating a target dynamic password for the target operating system based on the system information comprises:
randomly selecting a preset number of characters from the system identifier, and determining a password character string based on the randomly selected characters, password generation time and password generation times;
encrypting the password character string to obtain an encrypted character string;
and adjusting the encryption character string based on a preset password configuration rule to obtain the target dynamic password.
3. The password modification method according to claim 1, further comprising, before acquiring system information of a target operating system to be password-modified:
responding to an operating system registration request submitted by an administrator terminal, and registering an operating system, wherein the operating system registration request carries system information of the operating system;
and storing the registered system information of the operating system into a database, and monitoring the registered operating system.
4. The method of claim 1, wherein generating a password modification script based on the target dynamic password and the validity period comprises:
acquiring a script template corresponding to the target operating system from a database based on the system type;
and generating the password modification script based on the target dynamic password, the effective duration and the script template.
5. The password modification method of claim 1, wherein the step of modifying the dynamic password of the target operating system by remotely scheduling execution of the password modification script comprises:
remotely synchronizing the password modification script into the target operating system based on the IP address and the account information;
Executing the password modification script, logging in the target operating system, and modifying the dynamic password of the target operating system.
6. The password modification method of claim 1, further comprising, after modifying the dynamic password of the target operating system:
verifying the target dynamic password to obtain a verification result;
storing the target dynamic password of the target operating system to a database and recording audit information under the condition that the verification result indicates that the target dynamic password passes verification, wherein the audit information is log information generated by executing corresponding actions on each operating system, and the audit information at least comprises: the system identification of the operating system, the IP address of the operating system, the system type of the operating system, the account information, the dynamic password of the operating system, the use condition of the dynamic password of the operating system, the application times of the dynamic password of the operating system and the usable time of the dynamic password of the operating system.
7. The password modification method of claim 1, further comprising, after modifying the dynamic password of the target operating system:
Receiving a system access list sent by a user side, wherein the system access list at least comprises: the system identification corresponding to the operating system to be accessed by the user side, the IP address corresponding to the operating system to be accessed by the user side, the account information, the access reason and the access duration application;
and carrying out authentication processing on the user terminal to obtain an authentication result, wherein the authentication processing at least comprises the following steps: authenticating whether the system access ticket is valid or not, and authenticating whether the user has an operating system access right or not;
and under the condition that the authentication result indicates that the user side passes authentication, returning a dynamic password corresponding to the operating system to be accessed to the user side, and recording audit information.
8. The password modification method of claim 1, further comprising:
calling audit information of the operating system, taking the operating system as the target operating system and modifying the dynamic password of the target operating system under the condition that the available time length of the dynamic password of the operating system is equal to a preset value;
and marking the operating system as an abnormal operating system under the condition that the dynamic password application times of the operating system is greater than or equal to a preset application times threshold value, generating abnormal alarm information based on the abnormal operating system, and sending the abnormal alarm information to an administrator terminal.
9. A password modification apparatus for a target operating system, comprising:
the system information of the target operating system at least comprises: system identification, IP address, system type, account information and dynamic password of each account;
the configuration unit is used for generating a target dynamic password of the target operating system based on the system information and configuring effective duration for the target dynamic password;
the generation unit is used for generating a password modification script based on the target dynamic password and the effective duration;
and the modification unit is used for executing the password modification script through remote scheduling and modifying the dynamic password of the target operating system.
10. A computer readable storage medium, characterized in that the computer readable storage medium comprises a stored computer program, wherein the computer program when run controls a device in which the computer readable storage medium is located to perform the method for modifying a password of a target operating system according to any one of claims 1 to 8.
11. An electronic device comprising one or more processors and a memory for storing one or more programs, wherein the one or more programs, when executed by the one or more processors, cause the one or more processors to implement the cryptographic modification method of the target operating system of any of claims 1-8.
CN202311560851.7A 2023-11-21 2023-11-21 Password modification method and device of target operating system and electronic equipment Pending CN117668817A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311560851.7A CN117668817A (en) 2023-11-21 2023-11-21 Password modification method and device of target operating system and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311560851.7A CN117668817A (en) 2023-11-21 2023-11-21 Password modification method and device of target operating system and electronic equipment

Publications (1)

Publication Number Publication Date
CN117668817A true CN117668817A (en) 2024-03-08

Family

ID=90085549

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311560851.7A Pending CN117668817A (en) 2023-11-21 2023-11-21 Password modification method and device of target operating system and electronic equipment

Country Status (1)

Country Link
CN (1) CN117668817A (en)

Similar Documents

Publication Publication Date Title
EP3123692B1 (en) Techniques to operate a service with machine generated authentication tokens
US20220132074A1 (en) Self-healing video surveillance system
US10462148B2 (en) Dynamic data masking for mainframe application
US20070169174A1 (en) User authentication for computer systems
US20100325687A1 (en) Systems and Methods for Custom Device Automatic Password Management
CN1981277A (en) Quarantine system
US9053343B1 (en) Token-based debugging of access control policies
CN108206831A (en) Implementation method and server, the client and readable storage medium storing program for executing of E-seal
US20130024769A1 (en) Apparatus and method for processing a document
WO2021101632A1 (en) Know your customer (kyc) and anti-money laundering (aml) verification in a multi-decentralized private blockchains network
CN112150113A (en) Method, device and system for borrowing file data and method for borrowing data
CN113487321A (en) Identity identification and verification method and system based on block chain wallet
US20230252169A1 (en) Executing commands on air-gapped computer systems
WO2022116761A1 (en) Self auditing blockchain
US20210334085A1 (en) Systems and methods for secure over-the-air updates for cyber-physical systems
CN112328975A (en) Product software authorization management method, terminal device and medium
CN111600701A (en) Private key storage method and device based on block chain and storage medium
CN114257436B (en) Access security management method and system suitable for fort machine, electronic equipment and readable storage medium
CN110472423A (en) A kind of nuclear power station file permission management method, device and equipment
CN117668817A (en) Password modification method and device of target operating system and electronic equipment
CN112367339B (en) System security login management method and device
Megha Authentication of Financial Wallet System and Data Protection using BlockChain
US11960612B2 (en) Access control for air-gapped computer systems
US20220222367A1 (en) Data aggregation for analysis and secure storage
KR100705145B1 (en) The system and the method using USB key by smart card's method in the Application Service Providing business

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination