Disclosure of Invention
The invention aims to solve the defects in the prior art and provides a safety authentication method and a safety authentication system.
In order to achieve the above purpose, the present invention adopts the following technical scheme: the security authentication system comprises an authentication center, a server terminal, an information management library, a login module, an authentication mode authentication module, a security guarantee authentication module, an external module and a service module, wherein the login module consists of a touch display unit, a registration unit and a protocol unit, the security guarantee authentication module consists of an authentication unit and a backtracking unit, and the security guarantee authentication module consists of an information identification unit and an authentication unit.
A security authentication method comprising the steps of:
s1: and (3) login: firstly, a user opens a login module, clicks a protocol unit, clicks and confirms after carefully reading, if the registration is not completed, the user can click a registration unit to register information, after the information registration is completed, the information is encrypted and uploaded to an information management library to be stored, if the registration is completed, the user clicks a touch display unit to input corresponding identity information, and the next step is entered;
s2: identification of an authentication mode: the information recorded in the S1 is transmitted to an authentication mode authentication module, and after authentication of an authentication unit is completed, the next step is carried out; if the session is overtime, the backtracking unit receives the signal, and then the authentication mode identification module automatically identifies the early session authentication mode and automatically jumps to the authentication system corresponding to the authentication mode;
s3: and (3) safety guarantee authentication: after the authentication in the S2 authentication mode is completed, an authentication unit in the security assurance authentication module receives the signal and is connected with the authentication center, then the signal is sent to an information recognition unit, the information recognition unit compares the input information in the S1 with the information stored in the information management library, and if the information is correct, the next step is carried out; if the information identification is wrong or can not be identified, returning to the login module;
s4: and (3) business processing: and S4, after the information authentication is correct, the corresponding service module is correspondingly entered for service processing, and service processing information is transmitted to the server terminal.
In order to facilitate the access of the third party authentication system, the invention is improved in that the external module is provided with an external interface, and the external module is expanded to access the third party authentication system through the external interface.
In order to ensure the standardization of the third party authentication system, the invention is improved in that the external module further comprises a detection unit, the detection unit can detect the access to the third party authentication system, can identify the access to the third party authentication system after confirming that the third party authentication system is correct, uploads and stores information to the server terminal, and if the third party authentication system has a loophole, signals are sent to the server terminal to force the third party authentication system to be powered off.
In order to improve the diversity of authentication modes, the invention is improved in that the touch display unit comprises an account password, a short message, a mailbox and a random code multi-factor login interface.
In order to improve the confidentiality of information storage, the invention improves that the login module in S1 also comprises an encryption unit and an uploading unit, wherein the encryption unit encrypts the registration information and transmits the registration information to the information management library for storage through the uploading unit.
In order to improve the flexibility of the system, the login module further comprises a modification unit, and the modification unit can change information.
In order to improve the backup effect of the service processing file, the invention improves that the service module in S4 comprises a service processing unit and a feedback unit, and after the service processing unit finishes processing, service processing information is fed back to the server terminal through the feedback unit.
In order to improve the safety effect of the system authentication, the invention improves that the safety guarantee authentication module in the S3 further comprises a machine locking unit, and if the number of times of verification failure exceeds 3 times, the machine locking unit can forcedly take the system off the machine.
In order to improve the autonomous reaction effect of the system, the invention improves that the safety guarantee authentication module in S3 also comprises a warning unit, and if repeated errors occur in information output in the process of information auditing, the warning unit can sort the error information, upload the error information to the server terminal and send out an alarm.
Compared with the prior art, the invention has the advantages and positive effects that:
1. according to the invention, by arranging the detection unit, the third party authentication system can be detected when the third party authentication system is accessed, so that the problem of the authentication process caused by the problem of the third party authentication system is avoided, the leakage of user information is caused, and the information security of the whole authentication process is greatly improved.
2. According to the invention, by arranging the machine locking unit and the warning unit, when a problem occurs in the authentication process, the whole system can be forced to be powered off and an alarm can be sent to the server terminal in time, so that background staff can process the information in time, and the information security of the whole system is further improved.
Detailed Description
The present invention will be described in further detail with reference to the drawings and examples, in order to make the objects, technical solutions and advantages of the present invention more apparent. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the invention.
In the description of the present invention, it should be understood that the terms "length," "width," "upper," "lower," "front," "rear," "left," "right," "vertical," "horizontal," "top," "bottom," "inner," "outer," and the like indicate orientations or positional relationships based on the orientation or positional relationships shown in the drawings, merely to facilitate describing the present invention and simplify the description, and do not indicate or imply that the devices or elements referred to must have a specific orientation, be configured and operated in a specific orientation, and therefore should not be construed as limiting the present invention. Furthermore, in the description of the present invention, the meaning of "a plurality" is two or more, unless explicitly defined otherwise.
Referring to fig. 1, the present invention provides a technical solution: the security authentication system comprises an authentication center, a server terminal, an information management library, a login module, an authentication mode authentication module, a security guarantee authentication module, an external module and a service module, wherein the login module consists of a touch display unit, a registration unit and a protocol unit, the security guarantee authentication module consists of an authentication unit and a backtracking unit, and the security guarantee authentication module consists of an information identification unit and an authentication unit.
A security authentication method comprising the steps of:
s1: and (3) login: firstly, a user opens a login module, clicks a protocol unit, clicks and confirms after carefully reading, if the registration is not completed, the user can click a registration unit to register information, after the information registration is completed, the information is encrypted and uploaded to an information management library to be stored, if the registration is completed, the user clicks a touch display unit to input corresponding identity information, and the next step is entered;
s2: identification of an authentication mode: the information recorded in the S1 is transmitted to an authentication mode authentication module, and after authentication of an authentication unit is completed, the next step is carried out; if the session is overtime, the backtracking unit receives the signal, and then the authentication mode identification module automatically identifies the early session authentication mode and automatically jumps to the authentication system corresponding to the authentication mode;
s3: and (3) safety guarantee authentication: after the authentication in the S2 authentication mode is completed, an authentication unit in the security assurance authentication module receives the signal and is connected with the authentication center, then the signal is sent to an information recognition unit, the information recognition unit compares the input information in the S1 with the information stored in the information management library, and if the information is correct, the next step is carried out; if the information identification is wrong or can not be identified, returning to the login module;
s4: and (3) business processing: and S4, after the information authentication is correct, the corresponding service module is correspondingly entered for service processing, and service processing information is transmitted to the server terminal.
In this embodiment, the external connection module is provided with an external connection interface, and the external connection module is connected to the third party authentication system through the external connection interface in an expansion manner, so that when the authentication system needs to be connected to the third party authentication system, the data line can be directly inserted into the external connection interface, the operation is simple and quick, and the quick connection of the third party authentication system can be realized.
In this embodiment, the external module further includes a detection unit, the detection unit may detect the access to the third party authentication system, identify the third party authentication system after confirming that the third party authentication system is error-free, upload and store information to the server terminal, if a leak exists in the third party authentication system, send a signal to the server terminal, force the third party authentication system to be powered off, after the third party authentication system is accessed through the external interface, scan the detection unit first, the detection unit will check the third party authentication system, ensure that the third party authentication system can be authenticated after error-free, and further improve the security of the whole system if a problem occurs.
In this embodiment, the touch display unit includes an account password, a short message, a mailbox, and a random code multi-factor login interface, and multiple login modes including the account password, the short message, the mailbox, the random code and the like are arranged in the touch display unit, so that flexibility of the whole authentication system is greatly improved, and a use range of the whole authentication system is widened.
In this embodiment, the login module in S1 further includes an encryption unit and an uploading unit, where the encryption unit encrypts the registration information and transmits the registration information to the information management library for storage through the uploading unit, and when the new user completes registration, the encryption unit encrypts the identity information of the user and outputs the encrypted identity information to the uploading unit, and the encrypted identity information is transmitted to the information management library through the uploading unit, so that a layer of guarantee can be provided for the user information additionally, and easy leakage of the user information is avoided.
In this embodiment, the login module further includes a modification unit, the modification unit may change information, and the modification unit disposed inside the login module is directly connected to the information management library and the server terminal through the internet unit, so that a user can modify personal information simply and quickly.
In this embodiment, the service module in S4 includes a service processing unit and a feedback unit, after the service processing unit processes the service, the service processing information is fed back to the server terminal through the feedback unit, and when the user service is processed, the service processing unit directly sends a signal to the feedback unit, and then the feedback unit feeds back the service processing information to the server terminal, so as to perform backup in time.
In this embodiment, the security protection authentication module in S3 further includes a machine locking unit, if the number of times of verification failure exceeds 3 times, the machine locking unit will force the system to be powered off, and when the number of times of verification failure exceeds 3 times, the machine locking unit in the security protection authentication module will respond in time at this time, and judge that the user information leaks, force the system to be powered off, so as to ensure the security of the user information.
In this embodiment, the security authentication module in S3 further includes a warning unit, if in the process of information auditing, if the information output has repeated errors, the warning unit will sort the error information, upload to the server terminal and send out an alarm, and when the user information has repeated input errors, the warning unit will timely feed back the user information to the server terminal and remind, so as to ensure that the staff can respond timely.
Working principle: firstly, a user opens a login module, clicks a protocol unit, clicks a carefully read and then confirms a single click, the protocol unit confirms that the next step can be carried out, the user who does not finish registration can click the registration unit to register information, after the information registration is finished, the system encrypts the information and uploads the information to an information management library to store the information, the registered user can click a touch display unit, the user can select a corresponding login mode and input corresponding identity information according to own information, enter the next step after confirmation, then the information can be transmitted to an authentication mode identification module, the authentication unit can judge a specific authentication mode according to the input information, enter the next step after authentication is finished, if the authentication process is overtime, a backtracking unit in the authentication mode identification module can receive signals and dynamically identify a previous session authentication mode, meanwhile, the authentication system of the corresponding authentication mode is automatically jumped to, the authentication unit in the security guarantee authentication module receives the signal and is connected with the authentication center, then the signal is sent to the information recognition unit, the information recognition unit compares the login information with the information stored in the information management library, if the information is correct, the next step is carried out, if the third party authentication system is required to be accessed, the connection can be directly carried out through an external interface, after the connection is completed, the detection unit receives the signal to detect the third party authentication system, the authentication can be carried out after confirming that the third party authentication system is correct, the information is uploaded and stored in the server terminal, if the third party authentication system has a leak, the signal is sent to the server terminal, the third party authentication system is forced to be started down, so that the problem of the authentication process caused by the problem of the third party authentication system is avoided, the leakage of the user information is caused, and feedback is carried out to the server terminal; if the information identification is wrong or can not be identified, the login module is directly returned, if the number of times of verification failure exceeds 3, the machine locking unit can force the system to be started down, meanwhile, in the information verification process, the information output is repeated in error, the warning unit can sort error information and upload the error information to the server terminal to send out an alarm, a background worker can conveniently respond in time, after S4 information authentication is correct, the corresponding business module can be correspondingly entered into for business processing, business processing information is transmitted to the server terminal, and through setting the system, the safety of the whole authentication process can be effectively improved, and leakage of user information is avoided.
The present invention is not limited to the above embodiments, and any equivalent embodiments which can be changed or modified by the technical disclosure described above can be applied to other fields, but any simple modification, equivalent changes and modification made to the above embodiments according to the technical matter of the present invention will still fall within the scope of the technical disclosure.