Double-factor authentication security supervisor login system and method

A technology of login system and login method, which is applied in the field of two-factor authentication security management machine login system, can solve problems such as system paralysis, malicious operation, and security management machine damage, and achieve the effect of reducing complexity

Active Publication Date: 2018-01-12
HANGZHOU ANHENG INFORMATION TECH CO LTD
View PDF7 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Once the security management machine is attacked and destroyed, it may lead to loss of enterprise data information, information leakage, system paralysis and other losses. It is very important to protect the security of the security management machine
Usually, you can enter the security management machine by entering the system user name and password, but there are great security risks. Hackers or illegal personnel may use techniques such as brute force cracking, malicious programs to analyze the account information files of the security management machine, and infiltrate the intranet. Get the account password of the security management machine by means, and then destroy and maliciously operate the security management machine

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Double-factor authentication security supervisor login system and method
  • Double-factor authentication security supervisor login system and method
  • Double-factor authentication security supervisor login system and method

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0033] The embodiment of the present invention provides a two-factor authentication security management machine login system 100, please refer to figure 1 , figure 1 A schematic diagram of functional modules of the two-factor authentication security management machine login system 100 provided by the embodiment of the present invention is shown.

[0034] The two-factor authentication security management machine login system 100 includes a server 110 , a user terminal 130 and a security management machine 120 . Wherein, both the user terminal 130 and the security management machine 120 are communicatively connected to the server 110 through a network.

[0035] It should be noted that the server 110 has simple functions such as registering an account, storing the account, storing the unique identification information of the security management machine 120, and the management relationship between them. At the same time, the server 110 also provides functions such as retrieving ...

no. 2 example

[0050] This embodiment provides a two-factor authentication security management machine login method. The two-factor authentication security management machine login method can be applied to the two-factor authentication security management machine login system 100 provided in the first embodiment.

[0051] It should be noted that the basic principles and technical effects of the two-factor authentication security management machine login method provided by this embodiment are the same as those of the above-mentioned embodiments. Corresponding content in the above-mentioned embodiment.

[0052] see Figure 4 , the two-factor authentication safety management machine login method includes the following steps:

[0053] Step S10: The security management machine 120 verifies the account number and password input by the user.

[0054] First, verify the account number and password input by the user. In particular, in the scenario where the security management machine 120 is logged...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a double-factor authentication security supervisor login system and method. Login plugin is installed in the security supervisor, unique identification is transmitted to a server, the server generates verification information according to the unique identification and returns the verification information to the security supervisor, the security supervisor displays the verification information as a two-dimensional code, a user terminal scans the two-dimensional code to verify the verification information, a server receives a verification request of the user terminal, when the request is matched with the account and verification information of the security supervisor in the server, the security supervisor is marked as verification passing, a verification passing state is transmitted to the security supervisor, and the security supervisor receives the verification passing state to finish login. By the double-factor authentication security supervisor login system and method, extra hardware is not required, double passwords do not need to be memorized, complicated rules do not need to be set, the cost is low, hardware such as USB key is omitted, double-factor login complexity degree is reduced, and the cost of the safety technology is reduced.

Description

technical field [0001] The invention relates to the field of security technology, in particular to a two-factor authentication security management machine login system and method. Background technique [0002] Many large enterprises such as the government, the military, and banks often run security services such as bastion hosts, security monitoring management platforms, and situational awareness on their servers. They monitor the status of hosts by issuing instructions and modifying rules to defend against system attacks. 1. Protecting data information, this type of server is referred to as a security management machine hereinafter. Once the security management machine is attacked and destroyed, it may lead to loss of enterprise data information, information leakage, system paralysis and other losses. It is very important to protect the security of the security management machine. Usually, you can enter the security management machine by entering the system user name and p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
Inventor 刘扬帆范渊
Owner HANGZHOU ANHENG INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products