Movatterモバイル変換


[0]ホーム

URL:


CN113315786B - Security authentication method and system - Google Patents

Security authentication method and system
Download PDF

Info

Publication number
CN113315786B
CN113315786BCN202110711530.7ACN202110711530ACN113315786BCN 113315786 BCN113315786 BCN 113315786BCN 202110711530 ACN202110711530 ACN 202110711530ACN 113315786 BCN113315786 BCN 113315786B
Authority
CN
China
Prior art keywords
authentication
unit
information
module
security
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110711530.7A
Other languages
Chinese (zh)
Other versions
CN113315786A (en
Inventor
闫志刚
路适远
景天岭
王瑞胤
高于喆
李帅康
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhengzhou Xinyuan Information Technology Co ltd
Original Assignee
Zhengzhou Xinyuan Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhengzhou Xinyuan Information Technology Co ltdfiledCriticalZhengzhou Xinyuan Information Technology Co ltd
Priority to CN202110711530.7ApriorityCriticalpatent/CN113315786B/en
Publication of CN113315786ApublicationCriticalpatent/CN113315786A/en
Application grantedgrantedCritical
Publication of CN113315786BpublicationCriticalpatent/CN113315786B/en
Activelegal-statusCriticalCurrent
Anticipated expirationlegal-statusCritical

Links

Images

Classifications

Landscapes

Abstract

The invention relates to the technical field of security authentication, in particular to a security authentication method and a system, comprising an authentication center, a server terminal, an information management library, a login module, an authentication mode authentication module, a security assurance authentication module, an external module and a service module, wherein the login module consists of a touch display unit, a registration unit and a protocol unit, the security assurance authentication module consists of an authentication unit and a backtracking unit, and the security assurance authentication module consists of an information identification unit and an authentication unit, and comprises the following steps: s1: logging in; s2: identifying an authentication mode; s3: safety guarantee authentication; s4: and (5) business processing. By arranging the detection unit, the third party authentication system can be detected when the third party authentication system is accessed, so that the problem of the authentication process caused by the problem of the third party authentication system is avoided, the leakage of user information is caused, and the information security of the whole authentication process is greatly improved.

Description

Security authentication method and system
Technical Field
The present invention relates to the field of security authentication technologies, and in particular, to a security authentication method and system.
Background
With the rapid development of electronic information in China, the electronic network technology is popular in China and becomes an important component of daily life of people, and when people provide convenience for life in the electronic network, security authentication is an essential step, and the security authentication is important because of the relation of private information of each person.
In the prior art, when authentication is performed, account passwords, short messages, mailboxes and other factors are adopted for identification authentication in most cases, meanwhile, in the authentication process, a third party system is sometimes required to be accessed for authentication, but when the third party system is accessed, identification detection is not performed on the third party system, if the third party system has problems, leakage of user information is easily caused, and the security of the whole authentication system is reduced.
Disclosure of Invention
The invention aims to solve the defects in the prior art and provides a safety authentication method and a safety authentication system.
In order to achieve the above purpose, the present invention adopts the following technical scheme: the security authentication system comprises an authentication center, a server terminal, an information management library, a login module, an authentication mode authentication module, a security guarantee authentication module, an external module and a service module, wherein the login module consists of a touch display unit, a registration unit and a protocol unit, the security guarantee authentication module consists of an authentication unit and a backtracking unit, and the security guarantee authentication module consists of an information identification unit and an authentication unit.
A security authentication method comprising the steps of:
s1: and (3) login: firstly, a user opens a login module, clicks a protocol unit, clicks and confirms after carefully reading, if the registration is not completed, the user can click a registration unit to register information, after the information registration is completed, the information is encrypted and uploaded to an information management library to be stored, if the registration is completed, the user clicks a touch display unit to input corresponding identity information, and the next step is entered;
s2: identification of an authentication mode: the information recorded in the S1 is transmitted to an authentication mode authentication module, and after authentication of an authentication unit is completed, the next step is carried out; if the session is overtime, the backtracking unit receives the signal, and then the authentication mode identification module automatically identifies the early session authentication mode and automatically jumps to the authentication system corresponding to the authentication mode;
s3: and (3) safety guarantee authentication: after the authentication in the S2 authentication mode is completed, an authentication unit in the security assurance authentication module receives the signal and is connected with the authentication center, then the signal is sent to an information recognition unit, the information recognition unit compares the input information in the S1 with the information stored in the information management library, and if the information is correct, the next step is carried out; if the information identification is wrong or can not be identified, returning to the login module;
s4: and (3) business processing: and S4, after the information authentication is correct, the corresponding service module is correspondingly entered for service processing, and service processing information is transmitted to the server terminal.
In order to facilitate the access of the third party authentication system, the invention is improved in that the external module is provided with an external interface, and the external module is expanded to access the third party authentication system through the external interface.
In order to ensure the standardization of the third party authentication system, the invention is improved in that the external module further comprises a detection unit, the detection unit can detect the access to the third party authentication system, can identify the access to the third party authentication system after confirming that the third party authentication system is correct, uploads and stores information to the server terminal, and if the third party authentication system has a loophole, signals are sent to the server terminal to force the third party authentication system to be powered off.
In order to improve the diversity of authentication modes, the invention is improved in that the touch display unit comprises an account password, a short message, a mailbox and a random code multi-factor login interface.
In order to improve the confidentiality of information storage, the invention improves that the login module in S1 also comprises an encryption unit and an uploading unit, wherein the encryption unit encrypts the registration information and transmits the registration information to the information management library for storage through the uploading unit.
In order to improve the flexibility of the system, the login module further comprises a modification unit, and the modification unit can change information.
In order to improve the backup effect of the service processing file, the invention improves that the service module in S4 comprises a service processing unit and a feedback unit, and after the service processing unit finishes processing, service processing information is fed back to the server terminal through the feedback unit.
In order to improve the safety effect of the system authentication, the invention improves that the safety guarantee authentication module in the S3 further comprises a machine locking unit, and if the number of times of verification failure exceeds 3 times, the machine locking unit can forcedly take the system off the machine.
In order to improve the autonomous reaction effect of the system, the invention improves that the safety guarantee authentication module in S3 also comprises a warning unit, and if repeated errors occur in information output in the process of information auditing, the warning unit can sort the error information, upload the error information to the server terminal and send out an alarm.
Compared with the prior art, the invention has the advantages and positive effects that:
1. according to the invention, by arranging the detection unit, the third party authentication system can be detected when the third party authentication system is accessed, so that the problem of the authentication process caused by the problem of the third party authentication system is avoided, the leakage of user information is caused, and the information security of the whole authentication process is greatly improved.
2. According to the invention, by arranging the machine locking unit and the warning unit, when a problem occurs in the authentication process, the whole system can be forced to be powered off and an alarm can be sent to the server terminal in time, so that background staff can process the information in time, and the information security of the whole system is further improved.
Drawings
Fig. 1 is a schematic flow chart of a security authentication method and system according to the present invention.
Detailed Description
The present invention will be described in further detail with reference to the drawings and examples, in order to make the objects, technical solutions and advantages of the present invention more apparent. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the invention.
In the description of the present invention, it should be understood that the terms "length," "width," "upper," "lower," "front," "rear," "left," "right," "vertical," "horizontal," "top," "bottom," "inner," "outer," and the like indicate orientations or positional relationships based on the orientation or positional relationships shown in the drawings, merely to facilitate describing the present invention and simplify the description, and do not indicate or imply that the devices or elements referred to must have a specific orientation, be configured and operated in a specific orientation, and therefore should not be construed as limiting the present invention. Furthermore, in the description of the present invention, the meaning of "a plurality" is two or more, unless explicitly defined otherwise.
Referring to fig. 1, the present invention provides a technical solution: the security authentication system comprises an authentication center, a server terminal, an information management library, a login module, an authentication mode authentication module, a security guarantee authentication module, an external module and a service module, wherein the login module consists of a touch display unit, a registration unit and a protocol unit, the security guarantee authentication module consists of an authentication unit and a backtracking unit, and the security guarantee authentication module consists of an information identification unit and an authentication unit.
A security authentication method comprising the steps of:
s1: and (3) login: firstly, a user opens a login module, clicks a protocol unit, clicks and confirms after carefully reading, if the registration is not completed, the user can click a registration unit to register information, after the information registration is completed, the information is encrypted and uploaded to an information management library to be stored, if the registration is completed, the user clicks a touch display unit to input corresponding identity information, and the next step is entered;
s2: identification of an authentication mode: the information recorded in the S1 is transmitted to an authentication mode authentication module, and after authentication of an authentication unit is completed, the next step is carried out; if the session is overtime, the backtracking unit receives the signal, and then the authentication mode identification module automatically identifies the early session authentication mode and automatically jumps to the authentication system corresponding to the authentication mode;
s3: and (3) safety guarantee authentication: after the authentication in the S2 authentication mode is completed, an authentication unit in the security assurance authentication module receives the signal and is connected with the authentication center, then the signal is sent to an information recognition unit, the information recognition unit compares the input information in the S1 with the information stored in the information management library, and if the information is correct, the next step is carried out; if the information identification is wrong or can not be identified, returning to the login module;
s4: and (3) business processing: and S4, after the information authentication is correct, the corresponding service module is correspondingly entered for service processing, and service processing information is transmitted to the server terminal.
In this embodiment, the external connection module is provided with an external connection interface, and the external connection module is connected to the third party authentication system through the external connection interface in an expansion manner, so that when the authentication system needs to be connected to the third party authentication system, the data line can be directly inserted into the external connection interface, the operation is simple and quick, and the quick connection of the third party authentication system can be realized.
In this embodiment, the external module further includes a detection unit, the detection unit may detect the access to the third party authentication system, identify the third party authentication system after confirming that the third party authentication system is error-free, upload and store information to the server terminal, if a leak exists in the third party authentication system, send a signal to the server terminal, force the third party authentication system to be powered off, after the third party authentication system is accessed through the external interface, scan the detection unit first, the detection unit will check the third party authentication system, ensure that the third party authentication system can be authenticated after error-free, and further improve the security of the whole system if a problem occurs.
In this embodiment, the touch display unit includes an account password, a short message, a mailbox, and a random code multi-factor login interface, and multiple login modes including the account password, the short message, the mailbox, the random code and the like are arranged in the touch display unit, so that flexibility of the whole authentication system is greatly improved, and a use range of the whole authentication system is widened.
In this embodiment, the login module in S1 further includes an encryption unit and an uploading unit, where the encryption unit encrypts the registration information and transmits the registration information to the information management library for storage through the uploading unit, and when the new user completes registration, the encryption unit encrypts the identity information of the user and outputs the encrypted identity information to the uploading unit, and the encrypted identity information is transmitted to the information management library through the uploading unit, so that a layer of guarantee can be provided for the user information additionally, and easy leakage of the user information is avoided.
In this embodiment, the login module further includes a modification unit, the modification unit may change information, and the modification unit disposed inside the login module is directly connected to the information management library and the server terminal through the internet unit, so that a user can modify personal information simply and quickly.
In this embodiment, the service module in S4 includes a service processing unit and a feedback unit, after the service processing unit processes the service, the service processing information is fed back to the server terminal through the feedback unit, and when the user service is processed, the service processing unit directly sends a signal to the feedback unit, and then the feedback unit feeds back the service processing information to the server terminal, so as to perform backup in time.
In this embodiment, the security protection authentication module in S3 further includes a machine locking unit, if the number of times of verification failure exceeds 3 times, the machine locking unit will force the system to be powered off, and when the number of times of verification failure exceeds 3 times, the machine locking unit in the security protection authentication module will respond in time at this time, and judge that the user information leaks, force the system to be powered off, so as to ensure the security of the user information.
In this embodiment, the security authentication module in S3 further includes a warning unit, if in the process of information auditing, if the information output has repeated errors, the warning unit will sort the error information, upload to the server terminal and send out an alarm, and when the user information has repeated input errors, the warning unit will timely feed back the user information to the server terminal and remind, so as to ensure that the staff can respond timely.
Working principle: firstly, a user opens a login module, clicks a protocol unit, clicks a carefully read and then confirms a single click, the protocol unit confirms that the next step can be carried out, the user who does not finish registration can click the registration unit to register information, after the information registration is finished, the system encrypts the information and uploads the information to an information management library to store the information, the registered user can click a touch display unit, the user can select a corresponding login mode and input corresponding identity information according to own information, enter the next step after confirmation, then the information can be transmitted to an authentication mode identification module, the authentication unit can judge a specific authentication mode according to the input information, enter the next step after authentication is finished, if the authentication process is overtime, a backtracking unit in the authentication mode identification module can receive signals and dynamically identify a previous session authentication mode, meanwhile, the authentication system of the corresponding authentication mode is automatically jumped to, the authentication unit in the security guarantee authentication module receives the signal and is connected with the authentication center, then the signal is sent to the information recognition unit, the information recognition unit compares the login information with the information stored in the information management library, if the information is correct, the next step is carried out, if the third party authentication system is required to be accessed, the connection can be directly carried out through an external interface, after the connection is completed, the detection unit receives the signal to detect the third party authentication system, the authentication can be carried out after confirming that the third party authentication system is correct, the information is uploaded and stored in the server terminal, if the third party authentication system has a leak, the signal is sent to the server terminal, the third party authentication system is forced to be started down, so that the problem of the authentication process caused by the problem of the third party authentication system is avoided, the leakage of the user information is caused, and feedback is carried out to the server terminal; if the information identification is wrong or can not be identified, the login module is directly returned, if the number of times of verification failure exceeds 3, the machine locking unit can force the system to be started down, meanwhile, in the information verification process, the information output is repeated in error, the warning unit can sort error information and upload the error information to the server terminal to send out an alarm, a background worker can conveniently respond in time, after S4 information authentication is correct, the corresponding business module can be correspondingly entered into for business processing, business processing information is transmitted to the server terminal, and through setting the system, the safety of the whole authentication process can be effectively improved, and leakage of user information is avoided.
The present invention is not limited to the above embodiments, and any equivalent embodiments which can be changed or modified by the technical disclosure described above can be applied to other fields, but any simple modification, equivalent changes and modification made to the above embodiments according to the technical matter of the present invention will still fall within the scope of the technical disclosure.

Claims (8)

CN202110711530.7A2021-06-252021-06-25Security authentication method and systemActiveCN113315786B (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN202110711530.7ACN113315786B (en)2021-06-252021-06-25Security authentication method and system

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN202110711530.7ACN113315786B (en)2021-06-252021-06-25Security authentication method and system

Publications (2)

Publication NumberPublication Date
CN113315786A CN113315786A (en)2021-08-27
CN113315786Btrue CN113315786B (en)2023-05-26

Family

ID=77380296

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN202110711530.7AActiveCN113315786B (en)2021-06-252021-06-25Security authentication method and system

Country Status (1)

CountryLink
CN (1)CN113315786B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
KR20160062516A (en)*2014-11-252016-06-02한국수력원자력 주식회사System and method for tracking plant trip cause using data link between plant gateway system and single point vulnerability monitor in CANDU Type NPPs
CN111158350A (en)*2020-01-162020-05-15斯润天朗(北京)科技有限公司 Diagnosis-based quality monitoring platform and system
CN112257007A (en)*2020-12-182021-01-22垒途智能教科技术研究院江苏有限公司Enterprise financial information management system
CN112671700A (en)*2020-10-222021-04-16垒途智能教科技术研究院江苏有限公司Enterprise economic management information safety system

Family Cites Families (17)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US7610341B2 (en)*2003-10-142009-10-27At&T Intellectual Property I, L.P.Filtered email differentiation
US7886343B2 (en)*2006-04-072011-02-08Dell Products L.P.Authentication service for facilitating access to services
DK2693362T3 (en)*2012-07-312015-07-27Sick Ag Detection system for mounting on a conveyor belt
KR101308210B1 (en)*2012-09-042013-09-13이예행Classification system of e-mail by personalization with automatically and operating method thereof
GB201915196D0 (en)*2014-12-182019-12-04Sophos LtdA method and system for network access control based on traffic monitoring and vulnerability detection using process related information
CN105354507B (en)*2015-10-232018-09-11浙江远望软件有限公司A kind of data safety time slot scrambling under cloud environment
CN106296112A (en)*2016-07-282017-01-04广州猫眼网络科技有限公司Attendance checking system based on recognition of face, method and device thereof
CN108108156A (en)*2016-11-232018-06-01上海冰穹网络科技有限公司SDK Subscriber Management Systems and method
CN107196943B (en)*2017-05-262019-09-20浙江大学 A method for implementing secure display of private data on a third-party platform
CN108985075A (en)*2017-06-022018-12-11成都小娱网络科技有限公司A kind of image file disk encryption system and method for lightweight
CN107493378B (en)*2017-08-072020-05-26Oppo广东移动通信有限公司 Method and apparatus for application program login, computer device and readable storage medium
CN107959680B (en)*2017-11-302020-05-12哈尔滨森美朴科技发展有限责任公司Password-free registration login method and system
CN109120584B (en)*2018-06-192020-07-24上海交通大学Terminal security protection method and system based on UEFI and WinPE
US10936725B2 (en)*2018-10-172021-03-02Accenture Global Solutions LimitedContainer image vulnerability reduction
CN110708335A (en)*2019-10-292020-01-17深圳市融壹买信息科技有限公司Access authentication method and device and terminal equipment
CN111245799B (en)*2020-01-022022-01-11腾讯科技(深圳)有限公司Information monitoring method and device and readable storage medium
CN112512046B (en)*2020-12-162023-03-24南京理工大学Safety detection method for short message verification code authentication process of Android application program

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
KR20160062516A (en)*2014-11-252016-06-02한국수력원자력 주식회사System and method for tracking plant trip cause using data link between plant gateway system and single point vulnerability monitor in CANDU Type NPPs
CN111158350A (en)*2020-01-162020-05-15斯润天朗(北京)科技有限公司 Diagnosis-based quality monitoring platform and system
CN112671700A (en)*2020-10-222021-04-16垒途智能教科技术研究院江苏有限公司Enterprise economic management information safety system
CN112257007A (en)*2020-12-182021-01-22垒途智能教科技术研究院江苏有限公司Enterprise financial information management system

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
An Evaluation of Chromium OS:the Next Generation Operating System;Meng Wang;Rich Wolski;;计算机教育(第05期);全文*
基于负荷管理系统的数据传输安全模式探讨;阴存贞;刘琰;黄研利;于春菊;杨文宇;;陕西电力(第06期);全文*

Also Published As

Publication numberPublication date
CN113315786A (en)2021-08-27

Similar Documents

PublicationPublication DateTitle
CN104134253B (en)A kind of gate control system and gate inhibition's deployment method
CN103728894B (en)The long-range control method of a kind of terminal unit and system
CA2807189C (en)Method and apparatus for providing continuous authentication based on dynamic personal information
EP3712861A1 (en)Information prompting method, apparatus, and system, and intelligent electronic door lock
EP2803045B1 (en)Method and system for certifying the presence of an operator
CN102164113A (en)Face recognition login method and system
US11727360B2 (en)Method and system for reporting and monitoring location-related activities of mobile devices
US10546108B1 (en)Wearable computing device secure access badge
CN112734989B (en)Bluetooth key distribution method for intelligent door lock
CN106170793A (en)System, method and apparatus for secure log
CN105844737A (en)Camera based electronic lock system and use method
CN102695170A (en)Mobile platform possessing identity authentication function and identity authentication method
US20220171839A1 (en)Wearable computing device for automatic user validation
CN113315786B (en)Security authentication method and system
CN112039664B (en)Data communication method and system suitable for intelligent ammeter
CN117176413A (en)Remote management secret storage system based on encryption of national secret algorithm
CN114244874A (en)Unlocking control method and system, computer storage medium and electronic equipment
CN116471076A (en)Authentication login method and device for shared account
CN106033509A (en) Method and system for computer room inspection
CN108768993A (en)The method and apparatus that associated terminal logs in
JP2005092407A (en)Method, system, and program for managing attending and leaving office
CN106407769A (en)Method and device for unlocking screen, and electronic equipment
TR201702782A2 (en)One-time password message transmission.
US12141255B2 (en)Method for authenticating a user on client equipment
CN108053507A (en)A kind of management method of checking card based on cloud lock, system

Legal Events

DateCodeTitleDescription
PB01Publication
PB01Publication
SE01Entry into force of request for substantive examination
SE01Entry into force of request for substantive examination
GR01Patent grant
GR01Patent grant

[8]ページ先頭

©2009-2025 Movatter.jp