CN110807181A - Method, device and system for logging in and verifying database in enterprise - Google Patents
Method, device and system for logging in and verifying database in enterprise Download PDFInfo
- Publication number
- CN110807181A CN110807181A CN201911111840.4A CN201911111840A CN110807181A CN 110807181 A CN110807181 A CN 110807181A CN 201911111840 A CN201911111840 A CN 201911111840A CN 110807181 A CN110807181 A CN 110807181A
- Authority
- CN
- China
- Prior art keywords
- internal
- user
- enterprise
- database
- verification code
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 35
- 238000012795 verification Methods 0.000 claims abstract description 131
- 238000013507 mapping Methods 0.000 claims description 6
- 238000005516 engineering process Methods 0.000 description 3
- 238000004891 communication Methods 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 230000002159 abnormal effect Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000003247 decreasing effect Effects 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000000750 progressive effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/04—Real-time or near real-time messaging, e.g. instant messaging [IM]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The application provides a method, a device and a system for logging in and verifying an internal database of an enterprise, wherein the method for logging in and verifying the internal database is applied to the internal database of the enterprise, and comprises the following steps: after receiving a login request sent by a user terminal, judging whether the user identification corresponds to a legal user according to the user identification in the login request; generating a verification code message under the condition that the user identification is determined to correspond to a legal user; determining an internal user group identifier corresponding to the user identifier; and sending the verification code message to the internal user group corresponding to the internal user group identification. Because the internal user group only comprises the internal users of the enterprise, only the internal users of the enterprise can receive the verification code message, and the safety is higher; moreover, the verification code message can be timely and accurately received through the internal user group, so that the reliability is high. Because the instant communication software for operating the internal user group is used for free temporarily, the operation cost of the enterprise is not increased.
Description
Technical Field
The present application relates to the field of communications technologies, and in particular, to a method, an apparatus, and a system for verifying a database login in an enterprise.
Background
Most enterprises have internal systems that typically hold large amounts of internal data. For security, access is typically only allowed to users within the enterprise. In order to further protect the internal system, the internal system adds login verification operation, and most internal systems verify the identity of the user by using a graphic verification code or a short message verification code on a login page.
In recent years, the OCR image recognition technology is more and more accurate, and a person who is usually very useful writes a malicious program, recognizes the graphic verification code through the OCR image recognition technology, and maliciously logs in an internal system. Therefore, the security of adopting the pattern verification code mode is lower.
The short message verification code needs to pass through gateways of short message operators at all levels in the sending process, a user usually needs to receive the verification code within 30-90 seconds, and the short message verification code is often not received (the short message verification code is not received or is automatically intercepted to be used as a junk short message). Therefore, the reliability of the verification code method is low.
Disclosure of Invention
In view of this, the present application provides a method, an apparatus, and a system for verifying the login of an internal database of an enterprise, which can improve the security and reliability of the login verification of the internal database of the enterprise.
In order to achieve the above object, the present application provides the following technical features:
an internal database login verification method is applied to an enterprise internal database, and comprises the following steps:
after receiving a login request sent by a user terminal, judging whether the user identification corresponds to a legal user according to the user identification in the login request;
generating a verification code message under the condition that the user identification is determined to correspond to a legal user;
determining an internal user group identifier corresponding to the user identifier;
and sending the verification code message to the internal user group corresponding to the internal user group identification.
Optionally, the generating the verification code message when it is determined that the user identifier corresponds to a valid user includes:
under the condition that the user identification is determined to accord with the legality rule, determining that the user identification corresponds to a legal user;
generating a random verification code;
constructing the verification code message; wherein the authentication code message comprises the random authentication code and the user identification.
Optionally, before receiving the login request sent by the user terminal, the method further includes:
receiving a configuration request sent by a user terminal; wherein the configuration request comprises the user identification and the internal user group identification;
under the condition that the user identification is determined to correspond to a legal user, storing the user identification and the internal user group identification;
and constructing and storing the mapping relation between the user identification and the internal user group identification.
Optionally, the internal user group includes:
the internal user group which only contains internal users is constructed in the instant messaging application.
Optionally, the instant messaging application includes:
staples, WeChat, and/or QQ.
A method for logging in and verifying an internal database of an enterprise is applied to a user terminal, and comprises the following steps:
sending a login request to an internal database of the enterprise;
receiving verification code information sent by the enterprise internal database at an internal user group;
and sending the random verification code in the verification code message to the internal enterprise database so that the internal enterprise database verifies the random verification code.
Optionally, before sending the login request to the internal database of the enterprise, the method further includes:
adding an internal user group into the instant messaging software;
sending a configuration request to the internal enterprise database; wherein the configuration request comprises a user identification and an internal user group identification.
An internal database login verification device for an internal database of an enterprise, the device comprising:
the system comprises a judging unit, a judging unit and a judging unit, wherein the judging unit is used for judging whether a user identifier corresponds to a legal user according to the user identifier in a login request after receiving the login request sent by a user terminal;
the generating unit is used for generating a verification code message under the condition that the user identification is determined to correspond to a legal user;
a determining unit, configured to determine an internal user group identifier corresponding to the user identifier;
and the verification code message sending unit is used for sending the verification code message to the internal user group corresponding to the internal user group identifier.
An internal database login verification device is applied to a user terminal, and the method comprises the following steps:
a login request sending unit, which is used for sending a login request to an internal database of the enterprise;
a receiving unit, configured to receive, at an internal user group, a verification code message sent by the internal enterprise database;
and the verification code sending unit is used for sending the verification code in the verification code message to the enterprise internal database so as to verify the verification code by the enterprise internal database.
An intra-enterprise database login verification system, comprising:
the system comprises a user terminal, a database server and an enterprise internal database, wherein the user terminal is used for sending a login request to the enterprise internal database and receiving a verification code message sent by the enterprise internal database in an internal user group; sending the verification code in the verification code message to the internal enterprise database so that the internal enterprise database can verify the verification code;
the enterprise internal database is used for judging whether the user identification corresponds to a legal user according to the user identification in the login request after receiving the login request sent by the user terminal; generating a verification code message under the condition that the user identification is determined to correspond to a legal user; determining an internal user group identifier corresponding to the user identifier; and sending the verification code message to the internal user group corresponding to the internal user group identification.
Through the technical means, the following beneficial effects can be realized:
according to the method and the system, under the condition that the user terminal sends the login request to the internal database of the enterprise, the internal database of the enterprise generates the verification code message and sends the verification code message to the internal user group, so that the user terminal can obtain the verification code message from the internal user group and login the internal database of the enterprise.
Because the internal user group only comprises the internal users of the enterprise, only the internal users of the enterprise can receive the verification code message, and the safety is higher; moreover, the verification code message can be timely and accurately received through the internal user group, so that the reliability is high. Because the instant communication software for operating the internal user group is used for free temporarily, the operation cost of the enterprise is not increased.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a schematic structural diagram of an internal enterprise database login verification system disclosed in an embodiment of the present application;
fig. 2 is a flowchart of a first embodiment of a method for verifying the login of an internal enterprise database disclosed in the embodiments of the present application;
fig. 3 is a flowchart of a second embodiment of a method for verifying the login of an internal enterprise database disclosed in the embodiments of the present application;
fig. 4 is a schematic interface diagram of a method for verifying login of an internal enterprise database according to an embodiment of the present application;
fig. 5 is a flowchart of a first embodiment of an apparatus for verifying the login of an internal database of an enterprise according to the present disclosure;
fig. 6 is a flowchart of a second embodiment of an apparatus for verifying an internal database login according to the present application.
Detailed Description
The invention discloses a method, a device and a system for logging in an internal database of an enterprise.
Because the internal user group only comprises the internal users of the enterprise, only the internal users of the enterprise can receive the verification code message, and the safety is higher; moreover, the verification code message can be timely and accurately received through the internal user group, so that the reliability is high. Because the instant communication software for operating the internal user group is used for free temporarily, the operation cost of the enterprise is not increased.
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
Referring to fig. 1, the present application provides an internal database login verification system, including:
an internal enterprise database 100, and a plurality of user terminals 200 connected to the internal enterprise database 100;
the database 100 in the enterprise is used for storing a large amount of internal data, and the user terminal 200 logs in and accesses the database 100 in the enterprise.
The application provides an embodiment I of an internal database login verification method, which is used for introducing the preparation operation of an enterprise internal database and a user terminal in advance. Since the execution between each user terminal and the database in the enterprise is consistent, a detailed description will be given by taking one user terminal as an example.
Referring to fig. 2, the following steps may be included:
step S201: the user terminal adds the internal user group into the instant communication software.
Before the internal users of the enterprise need to log in the internal database of the enterprise by adopting the internal user group mode provided by the invention, the internal users need to join the internal user group of the enterprise firstly.
The internal user group includes: an internal user group which is constructed in the instant messaging application and only comprises internal users; the instant messaging application comprises: nails, wechat, and/or QQ, etc., although other instant messaging applications, such as 263, MSN, etc., may also be included, and are not described in detail herein.
Assuming that an enterprise uses "WeChat" as a communication tool for internal users, an internal user group can be constructed in the "WeChat". And the user identification corresponding to the internal user needs to be added into the internal user group corresponding to the enterprise.
The step is optional operation, and the operation of the step can be omitted under the condition that the internal user already joins the internal user group.
Step S202: the user terminal sends a configuration request to the internal database of the enterprise; wherein the configuration request comprises a user identification and an internal user group identification.
It can be understood that an enterprise may set different internal user groups according to different departments, and in some cases, an internal user has one internal user group, which is an internal user group that receives the verification code message; in some cases, an internal user may belong to different internal user groups, and the internal user may select one or more internal user groups as the internal user groups to receive the verification code message.
The user terminal may send a configuration request to the internal enterprise database, where the configuration request includes a user identifier and an internal user group identifier (an identifier of an internal user group, or multiple identifiers of multiple internal users, which is not limited to this), so that the internal enterprise database receives the configuration request.
Step S203: an enterprise internal database receives a configuration request sent by a user terminal; wherein the configuration request comprises the user identification and the internal user group identification.
Step S204: and under the condition that the user identification corresponds to a legal user, the internal database of the enterprise stores the user identification and the internal user group identification.
After receiving the configuration request, the internal enterprise database verifies the user identifier in the configuration request for security, specifically, compares the user identifier with a pre-stored internal user white list.
And under the condition that the user identification exists in the internal user white list, determining that the user identification corresponds to a legal user, namely determining that the user corresponding to the user identification is the internal user of the enterprise. Further, the intra-enterprise database may store the user identification and the intra-user group identification.
Step S205: and the enterprise internal database constructs and stores the mapping relation between the user identification and the internal user group identification.
In order to subsequently query an internal user group identifier corresponding to the user identifier, the internal database of the enterprise constructs and stores a mapping relation between the user identifier and the internal user group identifier.
The application provides an embodiment II of an internal database login verification method, which is used for introducing an online verification process of an enterprise internal database and a user terminal. Since the execution between each user terminal and the database in the enterprise is consistent, a detailed description will be given by taking one user terminal as an example.
Referring to fig. 3, the following steps may be included:
step S301: and the user terminal sends a login request to an internal database of the enterprise.
And the user terminal constructs a login request under the condition of determining that the internal database of the enterprise needs to be logged in. The login request comprises a user identification and a login password (in case the password is required by the database inside the enterprise). According to different application scenarios, the login request may further include other parameters, which are not described herein again.
And the user terminal sends a login request to an internal database of the enterprise.
Step S302: after receiving a login request sent by a user terminal, an internal enterprise database judges whether the user identification corresponds to a legal user according to the user identification in the login request. If yes, the process goes to step S303, otherwise, abnormal login is prompted.
In this step, a preset validity rule can be adopted to verify whether the user identifier corresponds to a valid user. For example, an internal user white list mode can be adopted as a judgment basis for the validity rule.
And when the user identification in the login request exists in the internal user white list, determining a legal user corresponding to the user identification, and if not, determining that the user identification corresponds to an illegal user.
The specific implementation of the validity rule may be different according to different application scenarios, and is not limited in the present application.
Step S303: and the database in the enterprise generates a verification code message under the condition that the user identification corresponds to a legal user.
Under the condition that the database in the enterprise determines that the user identification accords with the validity rule, determining that the user identification corresponds to a valid user, generating a random verification code and constructing a verification code message; wherein the authentication code message comprises the random authentication code and the user identification.
The internal database of the enterprise can generate the random verification code according to a preset verification code generation mode. The specific form of the random authentication code is not limited.
The internal database of the enterprise constructs verification code information which can also comprise user identification besides the random verification code. Because the authentication code message is sent to an internal user group, the internal user group has many users. In order to avoid the situation that the receiving user is not clear and the random verification code is used in a confusing way, the user identification is added into the verification code message so as to display the user identification and the random verification code in the internal user group.
The passcode message may also include other parameters, such as the validity time of the passcode (e.g., one minute validity time). The verification code message may further include other parameters according to different scenarios, which are not described in detail herein.
Step S304: and the enterprise internal database determines an internal user group identification corresponding to the user identification.
The enterprise internal database queries, according to a mapping relationship stored in advance, an internal user group identifier (an identifier of one internal user group, or multiple identifiers of multiple internal users, which is not limited) corresponding to the user identifier.
Step S305: and the enterprise internal database sends the verification code message to the internal user group corresponding to the internal user group identification.
It can be understood that the internal user group exists in the instant messaging software, so the internal database of the enterprise sends the verification code message to the instant messaging software server through the data interface with the instant messaging software server, so that the instant messaging software server sends the verification code message to the internal user group corresponding to the internal user group identifier.
Step S306: and the user terminal receives the verification code message sent by the enterprise internal database in an internal user group.
And the instant communication software of the user terminal displays the verification code message for the user to check.
Referring to fig. 4, in the case that the authentication code message includes the user identifier, the random authentication code, and the valid time, the display interface of the instant messenger may refer to fig. 4. The effective time is continuously decreased in a countdown mode so as to inform the user terminal of the real-time effective time of the random verification code.
Step S307: and the user terminal sends the random verification code in the verification code message to the internal enterprise database so that the internal enterprise database verifies the random verification code.
The internal user can manually input the random verification code to a login interface of an internal database of the enterprise, the user terminal can also extract the random verification code from the instant messaging software, and other implementation modes can be adopted, and the specific implementation mode is not limited.
And the user terminal sends the random verification code and the user identification to an internal enterprise database.
Step S308: and the internal database of the enterprise receives and verifies the random verification code.
The internal database of the enterprise receives the user identification and the random verification code to check whether the random verification code of the user identification is consistent with the random verification code issued to the user identification, and if so, the user can log in; if not, determining that the login is not possible.
As can be seen from the embodiments shown in fig. 2 and 3, the present invention has the following advantages:
in the invention, the internal database of the enterprise generates the verification code message and sends the verification code message to the internal user group under the condition that the user terminal sends a login request to the internal database of the enterprise, so that the user terminal can acquire the verification code message from the internal user group and login the internal database of the enterprise.
Because the internal user group only comprises the internal users of the enterprise, only the internal users of the enterprise can receive the verification code message, and the safety is higher; moreover, the verification code message can be timely and accurately received through the internal user group, so that the reliability is high. Because the instant communication software for operating the internal user group is used for free temporarily, the operation cost of the enterprise is not increased.
Referring to fig. 5, the present application provides an apparatus for verifying logging in an internal database of an enterprise, where the apparatus includes:
the judging unit 51 is configured to, after receiving a login request sent by a user terminal, judge whether a user identifier corresponds to a valid user according to the user identifier in the login request;
a generating unit 52, configured to generate an authentication code message if it is determined that the user identifier corresponds to a valid user;
a determining unit 53, configured to determine an internal user group identifier corresponding to the user identifier;
and the verification code message sending unit is used for sending the verification code message to the internal user group corresponding to the internal user group identifier.
Wherein the generating of the verification code message upon determining that the user identifier corresponds to a legitimate user comprises:
under the condition that the user identification is determined to accord with the legality rule, determining that the user identification corresponds to a legal user;
generating a random verification code;
constructing the verification code message; wherein the authentication code message comprises the random authentication code and the user identification.
Before receiving a login request sent by a user terminal, the method further comprises the following steps:
receiving a configuration request sent by a user terminal; wherein the configuration request comprises the user identification and the internal user group identification;
under the condition that the user identification is determined to correspond to a legal user, storing the user identification and the internal user group identification;
and constructing and storing the mapping relation between the user identification and the internal user group identification.
Wherein the internal user group comprises: the internal user group which only contains internal users is constructed in the instant messaging application.
Wherein the instant messaging application comprises: staples, WeChat, and/or QQ.
For specific implementation of the embodiment shown in fig. 5, reference may be made to the embodiments shown in fig. 2 and fig. 3, which are not described herein again.
Referring to fig. 6, the present application provides an apparatus for verifying logging in an internal database of an enterprise, which is applied to a user terminal, and the apparatus includes:
a login request sending unit 61, configured to send a login request to an internal database of an enterprise;
a receiving unit 62, configured to receive, at an internal user group, a verification code message sent by the internal enterprise database;
and a verification code sending unit 63, configured to send the verification code in the verification code message to the internal enterprise database, so that the internal enterprise database verifies the verification code.
Before sending the login request to the internal database of the enterprise, the method further comprises the following steps:
adding an internal user group into the instant messaging software; sending a configuration request to the internal enterprise database; wherein the configuration request comprises a user identification and an internal user group identification.
For specific implementation of the embodiment shown in fig. 6, reference may be made to the embodiments shown in fig. 2 and fig. 3, which are not described herein again.
Referring to fig. 1, the present application provides an internal database login verification system, including:
the system comprises a user terminal 200, a database server and a database server, wherein the user terminal is used for sending a login request to an internal enterprise database and receiving a verification code message sent by the internal enterprise database in an internal user group; sending the verification code in the verification code message to the internal enterprise database so that the internal enterprise database can verify the verification code;
the internal enterprise database 100 is configured to, after receiving a login request sent by a user terminal, determine whether a user identifier corresponds to a valid user according to the user identifier in the login request; generating a verification code message under the condition that the user identification is determined to correspond to a legal user; determining an internal user group identifier corresponding to the user identifier; and sending the verification code message to the internal user group corresponding to the internal user group identification.
For specific implementation of the internal enterprise login system, reference may be made to the embodiments shown in fig. 2 and fig. 3, which are not described herein again.
The functions described in the method of the present embodiment, if implemented in the form of software functional units and sold or used as independent products, may be stored in a storage medium readable by a computing device. Based on such understanding, part of the contribution to the prior art of the embodiments of the present application or part of the technical solution may be embodied in the form of a software product stored in a storage medium and including several instructions for causing a computing device (which may be a personal computer, a server, a mobile computing device or a network device) to execute all or part of the steps of the method described in the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
The embodiments are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same or similar parts among the embodiments are referred to each other.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present application. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the application. Thus, the present application is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.
Claims (10)
1. An internal database login verification method for an enterprise is applied to an internal database of the enterprise, and the method comprises the following steps:
after receiving a login request sent by a user terminal, judging whether the user identification corresponds to a legal user according to the user identification in the login request;
generating a verification code message under the condition that the user identification is determined to correspond to a legal user;
determining an internal user group identifier corresponding to the user identifier;
and sending the verification code message to the internal user group corresponding to the internal user group identification.
2. The method of claim 1, wherein generating an authentication code message if it is determined that the user identification corresponds to a legitimate user comprises:
under the condition that the user identification is determined to accord with the legality rule, determining that the user identification corresponds to a legal user;
generating a random verification code;
constructing the verification code message; wherein the authentication code message comprises the random authentication code and the user identification.
3. The method of claim 2, prior to receiving the login request sent by the user terminal, further comprising:
receiving a configuration request sent by a user terminal; wherein the configuration request comprises the user identification and the internal user group identification;
under the condition that the user identification is determined to correspond to a legal user, storing the user identification and the internal user group identification;
and constructing and storing the mapping relation between the user identification and the internal user group identification.
4. The method of any one of claims 1-3, wherein the inner user group comprises:
the internal user group which only contains internal users is constructed in the instant messaging application.
5. The method of claim 4, wherein the instant messaging application comprises:
staples, WeChat, and/or QQ.
6. A method for logging in and verifying an internal database of an enterprise is applied to a user terminal, and comprises the following steps:
sending a login request to an internal database of the enterprise;
receiving verification code information sent by the enterprise internal database at an internal user group;
and sending the random verification code in the verification code message to the internal enterprise database so that the internal enterprise database verifies the random verification code.
7. The method of claim 6, prior to sending the login request to the intra-enterprise database, further comprising:
adding an internal user group into the instant messaging software;
sending a configuration request to the internal enterprise database; wherein the configuration request comprises a user identification and an internal user group identification.
8. An apparatus for logging verification of an internal database of an enterprise, the apparatus being applied to the internal database of the enterprise, the apparatus comprising:
the system comprises a judging unit, a judging unit and a judging unit, wherein the judging unit is used for judging whether a user identifier corresponds to a legal user according to the user identifier in a login request after receiving the login request sent by a user terminal;
the generating unit is used for generating a verification code message under the condition that the user identification is determined to correspond to a legal user;
a determining unit, configured to determine an internal user group identifier corresponding to the user identifier;
and the verification code message sending unit is used for sending the verification code message to the internal user group corresponding to the internal user group identifier.
9. An internal database login verification device of an enterprise is characterized by being applied to a user terminal, and the method comprises the following steps:
a login request sending unit, which is used for sending a login request to an internal database of the enterprise;
a receiving unit, configured to receive, at an internal user group, a verification code message sent by the internal enterprise database;
and the verification code sending unit is used for sending the verification code in the verification code message to the enterprise internal database so as to verify the verification code by the enterprise internal database.
10. An internal enterprise database login verification system, comprising:
the system comprises a user terminal, a database server and an enterprise internal database, wherein the user terminal is used for sending a login request to the enterprise internal database and receiving a verification code message sent by the enterprise internal database in an internal user group; sending the verification code in the verification code message to the internal enterprise database so that the internal enterprise database can verify the verification code;
the enterprise internal database is used for judging whether the user identification corresponds to a legal user according to the user identification in the login request after receiving the login request sent by the user terminal; generating a verification code message under the condition that the user identification is determined to correspond to a legal user; determining an internal user group identifier corresponding to the user identifier; and sending the verification code message to the internal user group corresponding to the internal user group identification.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911111840.4A CN110807181A (en) | 2019-11-14 | 2019-11-14 | Method, device and system for logging in and verifying database in enterprise |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911111840.4A CN110807181A (en) | 2019-11-14 | 2019-11-14 | Method, device and system for logging in and verifying database in enterprise |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110807181A true CN110807181A (en) | 2020-02-18 |
Family
ID=69502607
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201911111840.4A Pending CN110807181A (en) | 2019-11-14 | 2019-11-14 | Method, device and system for logging in and verifying database in enterprise |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110807181A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112671738A (en) * | 2020-12-16 | 2021-04-16 | 平安普惠企业管理有限公司 | Login method, device, terminal and storage medium of enterprise internal system |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2002108819A (en) * | 2000-09-29 | 2002-04-12 | Toshiba Corp | Inner-company communication system and authentication server |
US20030070069A1 (en) * | 2001-10-10 | 2003-04-10 | Abhijit Belapurkar | Authentication module for an enterprise access management system |
US20040243832A1 (en) * | 2001-10-17 | 2004-12-02 | Saar Wilf | Verification of a person identifier received online |
CN105703910A (en) * | 2016-04-18 | 2016-06-22 | 中邮建技术有限公司 | Dynamic password verifying method based on Wechat service number |
CN105897704A (en) * | 2016-03-31 | 2016-08-24 | 腾讯科技(深圳)有限公司 | Authority adding method, device, and system, and authority addition requesting method and device |
CN109660484A (en) * | 2017-10-10 | 2019-04-19 | 爱信诺征信有限公司 | A kind of enterprise's real name identification method and certificate server |
CN109933974A (en) * | 2019-02-14 | 2019-06-25 | 平安科技(深圳)有限公司 | Cryptographic initialization method, apparatus, computer equipment and storage medium |
-
2019
- 2019-11-14 CN CN201911111840.4A patent/CN110807181A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2002108819A (en) * | 2000-09-29 | 2002-04-12 | Toshiba Corp | Inner-company communication system and authentication server |
US20030070069A1 (en) * | 2001-10-10 | 2003-04-10 | Abhijit Belapurkar | Authentication module for an enterprise access management system |
US20040243832A1 (en) * | 2001-10-17 | 2004-12-02 | Saar Wilf | Verification of a person identifier received online |
CN105897704A (en) * | 2016-03-31 | 2016-08-24 | 腾讯科技(深圳)有限公司 | Authority adding method, device, and system, and authority addition requesting method and device |
CN105703910A (en) * | 2016-04-18 | 2016-06-22 | 中邮建技术有限公司 | Dynamic password verifying method based on Wechat service number |
CN109660484A (en) * | 2017-10-10 | 2019-04-19 | 爱信诺征信有限公司 | A kind of enterprise's real name identification method and certificate server |
CN109933974A (en) * | 2019-02-14 | 2019-06-25 | 平安科技(深圳)有限公司 | Cryptographic initialization method, apparatus, computer equipment and storage medium |
Non-Patent Citations (1)
Title |
---|
李向荣;李丽;王步宇;: "SQL Server 2000数据库安全管理及配置", no. 14, pages 61 - 62 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112671738A (en) * | 2020-12-16 | 2021-04-16 | 平安普惠企业管理有限公司 | Login method, device, terminal and storage medium of enterprise internal system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105847245B (en) | Electronic mailbox login authentication method and device | |
CN106779716B (en) | Authentication method, device and system based on block chain account address | |
CN107086979B (en) | User terminal verification login method and device | |
CN106453205B (en) | identity verification method and device | |
CN106096343A (en) | Message access control method and equipment | |
CN107196972B (en) | A kind of authentication method and system, terminal and server | |
CN110795174B (en) | Application program interface calling method, device, equipment and readable storage medium | |
CN107241329B (en) | Account login processing method and device | |
CN104954330A (en) | Method of accessing data resources, device and system | |
CN110647738B (en) | Service wind control adaptation method, device, equipment and storage medium | |
CN106060034A (en) | Account login method and device | |
CN106130971A (en) | Identity identifying method and certificate server | |
CN105701423A (en) | Data storage method and device applied to cloud payment transactions | |
CN103905194A (en) | Identity traceability authentication method and system | |
CN112118234A (en) | Method for controlling multi-terminal authentication based on dynamic two-dimensional code | |
CN107770053B (en) | Instant message prompting method in off-line state | |
CN111597538A (en) | Verification code generation method and system | |
CN108965335B (en) | Method for preventing malicious access to login interface, electronic device and computer medium | |
CN110943840B (en) | Signature verification method | |
CN105812380A (en) | Verification method and device | |
CN112448956A (en) | Authority processing method and device of short message verification code and computer equipment | |
CN111949363B (en) | Business access management method, computer equipment, storage medium and system | |
CN105282166A (en) | Identity authentication method and system for linux operating system | |
CN105100093A (en) | Identity authentication method and identity authentication server | |
CN110807181A (en) | Method, device and system for logging in and verifying database in enterprise |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
AD01 | Patent right deemed abandoned |
Effective date of abandoning: 20240322 |
|
AD01 | Patent right deemed abandoned |