CN113132375A - Remote trusted verification method, system and storage medium based on secret key - Google Patents
Remote trusted verification method, system and storage medium based on secret key Download PDFInfo
- Publication number
- CN113132375A CN113132375A CN202110400823.3A CN202110400823A CN113132375A CN 113132375 A CN113132375 A CN 113132375A CN 202110400823 A CN202110400823 A CN 202110400823A CN 113132375 A CN113132375 A CN 113132375A
- Authority
- CN
- China
- Prior art keywords
- key
- authority
- secret key
- controlled server
- login
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 20
- 238000012795 verification Methods 0.000 title claims description 14
- 230000002093 peripheral effect Effects 0.000 claims description 7
- 239000000284 extract Substances 0.000 claims description 5
- 238000012360 testing method Methods 0.000 claims 5
- 238000007689 inspection Methods 0.000 abstract description 7
- 230000000694 effects Effects 0.000 description 4
- 238000006467 substitution reaction Methods 0.000 description 3
- 230000007547 defect Effects 0.000 description 2
- 238000003780 insertion Methods 0.000 description 2
- 230000037431 insertion Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000012217 deletion Methods 0.000 description 1
- 230000037430 deletion Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000013213 extrapolation Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Abstract
The invention relates to a remote credibility inspection method, a system and a storage medium based on a secret key, comprising the following steps: s1: defining keys of users in different levels; s2: selecting a key storage mode, inputting login information on a management interface of the controlled server, and uploading a corresponding key to the controlled server; s3: the controlled server receives the secret key and analyzes the secret key; s4: and comparing and checking the authority to obtain a login result.
Description
Technical Field
The invention belongs to the technical field of remote trusted inspection methods, and particularly relates to a remote trusted inspection method and system based on a secret key and a storage medium.
Background
With the development of cloud computing applications, information security becomes more important. When the system of the server is tampered, the server is easy to attack, and security risks exist. In the prior art, in order to prevent a system of a server from being tampered, the server assigns different levels of authority by setting different users.
However, the authority is distributed through the user name and the password, so that the user can be easily cracked and confidential information can be obtained; especially, high-authority users such as root users have a very high operable range, and once cracked or leaked, the high-authority users bring a very large risk to the safety of the whole system. This is a technical problem in the prior art.
In view of the above, the present invention provides a remote trusted verification method, system and storage medium based on secret key; to solve the defects and problems in the prior art.
Disclosure of Invention
Aiming at the defects that in the prior art, the authority is distributed through a user name and a password, and the authority is easy to crack and acquire confidential information, the problem of bringing great risk to the security of the system is solved; the invention provides a remote credibility inspection method, a system and a storage medium based on a secret key, which aim to solve the technical problems.
In order to achieve the purpose, the invention provides the following technical scheme:
in a first aspect, the present invention provides a remote trusted verification method based on a secret key, including the following steps:
s1: defining keys of users in different levels;
s2: selecting a key storage mode, inputting login information on a management interface of the controlled server, and uploading a corresponding key to the controlled server;
s3: the controlled server receives the secret key and analyzes the secret key;
s4: and comparing and checking the authority to obtain a login result.
Preferably, in step S1: super user and normal user permissions are defined.
Preferably, in step S2, a key storage manner is selected, and if the control machine stores the key, the user is required to upload the key to the controlled server every login;
if the key is stored for the mobile peripheral, the browser plug-in can read the key file stored in the equipment and transmit the login information and the key to the controlled server.
The effect of this step is: the controlled server receives the key in different ways under different storage ways of the key.
Preferably, in step S2, the login information includes a user name and a password.
Preferably, in step S3, the controlled server is provided with a server management port, and the server management port is configured to receive the login information and the key, and transmit the received login information and the received key directly to the backplane management controller of the controlled server, or transmit the login information and the received key to the backplane management controller of the controlled server through the smart card; the baseboard management controller verifies the matching of the user name and the password.
Preferably, in step S3, a key analysis module is disposed in the baseboard management controller, and the key analysis module analyzes the uploaded key, analyzes the authority defined by the key, and extracts the authority defined by the key.
The effect of this step is: the authority defined by the key can be analyzed and extracted from the uploaded key.
Preferably, in step S4, it is first verified whether the login information is correct, if the login information is incorrect, the login fails, if the login information is correct, it is checked whether the assigned authority corresponding to the user name is consistent with the extracted authority of the key, if the authority is consistent, the login succeeds, and if the authority is inconsistent, the login fails.
In a second aspect, the present invention provides a remote trusted verification system based on secret keys, including:
defining a user key module: defining super user and common user authority;
uploading a key module: firstly, selecting a secret key storage mode, inputting login information on a management interface of a controlled server, and uploading a corresponding secret key to the controlled server;
the key analysis module: the bottom plate management controller of the controlled server analyzes the uploaded secret key, analyzes the authority defined by the secret key and extracts the authority defined by the secret key;
and the permission comparison and check module: firstly, whether login information is correct is verified, if the login information is incorrect, login fails, if the login information is correct, whether the authority which is distributed to a user name and corresponds to the extracted key authority is consistent is checked, if the authority is consistent, login succeeds, and if the authority is inconsistent, login fails.
Preferably, in the key uploading module, a key storage mode is selected, and if the key is stored in the control machine, the user is required to upload the key to the controlled server every time login is performed;
if the key is stored for the mobile peripheral, the browser plug-in can read the key file stored in the equipment and transmit the login information and the key to the controlled server.
Preferably, in the upload key module, the login information includes a user name and a password.
Preferably, in the key analysis module, the controlled server is provided with a server management port, and the server management port is used for receiving the login information and the key and directly transmitting the received login information and the received key to a backplane management controller of the controlled server or transmitting the received login information and the received key to the backplane management controller of the controlled server through an intelligent network card; the baseboard management controller verifies the matching of the user name and the password.
In a third aspect, the present invention provides a computer storage medium having stored therein instructions that, when run on a computer, cause the computer to perform the above-described method.
The method has the advantages that on the basis that the super user adds other levels of users and authorities, secret key management and control is added, the secret key can be in a file form, can be directly uploaded on a login page, can also be in an extrapolation hardware form, and can be read by a browser plug-in. And after the user name, the password and the secret key pass the check of the controlled server, the user successfully logs in and carries out the operation in the related authority. The risk caused by acquiring the corresponding authority only by the user name and the password is reduced, and the security level of the system is improved.
In addition, the invention has reliable design principle, simple structure and very wide application prospect.
Drawings
In order to more clearly illustrate the embodiments or technical solutions in the prior art of the present invention, the drawings used in the description of the embodiments or prior art will be briefly described below, and it is obvious for those skilled in the art that other drawings can be obtained based on these drawings without creative efforts.
Fig. 1 is a flowchart of a remote feasibility verification method based on a secret key according to embodiment 1 of the present invention.
Fig. 2 is a schematic block diagram of a remote feasibility verification system based on a secret key according to embodiment 4 of the present invention.
The system comprises a user key definition module, an uploading key module, a 3-key analysis module and a 4-authority comparison and inspection module, wherein the user key definition module, the uploading key module, the authority comparison and inspection module and the authority comparison and inspection module are respectively arranged in the system.
Detailed Description
In order to make those skilled in the art better understand the technical solution of the present invention, the technical solution in the embodiment of the present invention will be clearly and completely described below with reference to the drawings in the embodiment of the present invention, and it is obvious that the described embodiment is only a part of the embodiment of the present invention, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Example 1:
as shown in fig. 1, the present embodiment provides a remote trusted verification method based on a secret key, including the following steps:
s1: defining keys of users in different levels;
in the step S1: super user and normal user permissions are defined.
S2: selecting a secret key storage mode, inputting a user name and a password on a management interface of the controlled server, and uploading a corresponding secret key to the controlled server;
in the step S2, selecting a key storage mode, and if the controller stores the key, the user is required to upload the key to the controlled server every time login;
if the key is stored for the mobile peripheral, the browser plug-in can read the key file stored in the equipment and transmit the login information and the key to the controlled server.
The effect of this step is: the controlled server receives the key in different ways under different storage ways of the key.
S3: the controlled server receives the secret key and analyzes the secret key;
in step S3, the controlled server sets a server management port, where the server management port is configured to receive the login information and the key, and directly transmit the received login information and the received key to the backplane management controller of the controlled server, or transmit the received login information and the received key to the backplane management controller of the controlled server through the smart card. The baseboard management controller verifies the matching of the user name and the password. And a secret key analysis module is arranged in the bottom plate management controller and is used for analyzing the uploaded secret key, analyzing the authority defined by the secret key and extracting the authority defined by the secret key.
The effect of this step is: the uploaded secret key can be received through the server management port, then the uploaded secret key is analyzed through the secret key analysis module, and the authority defined by the secret key is extracted.
S4: comparing and checking the authority to obtain a login result;
in step S4, it is first verified whether the login information is correct, if the login information is incorrect, the login fails, if the login information is correct, it is checked whether the assigned authority corresponding to the user name is consistent with the extracted authority of the key, if the authority is consistent, the login succeeds, and if the authority is inconsistent, the login fails.
Example 2:
the embodiment provides a remote trusted verification method based on a secret key, which comprises the following steps:
s1: defining keys of users in different levels;
in step S1, the super-user key0, the class a user key1, the class B user key2, and the class C user key 3;
the key0 defines the rights as: user allocation, KVM access authority, fault log access authority, storage device management authority and PCIE card management authority;
the key1 defines the rights as: KVM access authority, fault log access authority, storage device management authority and PCIE card management authority;
the key2 defines the rights as: KVM access authority, fault log access authority;
the key3 defines the rights as: KVM access rights.
S2: in the method of storing the secret key by the control machine, login information is input on a management interface of the controlled server, and the corresponding secret key is uploaded to the controlled server;
in step S2, the control computer remotely logs in the management interface of the controlled server, inputs root user name and password, and uploads the corresponding key 0.
S3: the controlled server receives the secret key and analyzes the secret key;
in step S3, the user name, the password, and the key are transmitted to the baseboard management controller of the controlled server, and the baseboard management controller checks the match between the user name and the password, and analyzes the uploaded key through the key analysis module, and analyzes the user right from the key.
S4: comparing and checking the authority to obtain a login result;
in step S4, the authority already assigned to the user name and the authority resolved from the key are checked, and if the check is consistent, the login is successful, and the super user may perform operations in the relevant authority.
In this embodiment, in the user management interface, the super user configures a class a user, sets the user name as adminl and the password as 111111, and allocates the KVM access authority, the fault log access authority, the storage device management authority, and the PCIE card management authority.
The A-level user admin1 logs in the controlled server management interface and inputs the user name: admin1, password: 111111, and upload key0, the user name, password, and key will be analyzed and checked in the bmc, since the user is class a, the key0, and the admin1 right after checking does not match the defined right in the key, so login is prohibited.
The A-level user admin1 logs in the controlled server management interface and inputs the user name: admin1, password: 111111, and upload key1, the user name, password, and key will be analyzed and checked in the baseboard management controller, since the authority defined in the key is consistent with the authority set by admin1 user, it is possible to log in the management interface and perform the operation within the authority.
Example 3:
the embodiment provides a remote trusted verification method based on a secret key, which comprises the following steps:
s1: defining keys of users in different levels;
in step S1, the secret key is provided to the operator in the form of a component, where the component is mainly a USB interface and the name of the component is set to U _ key;
the secret key file exists in the U _ key, the authority of the component is read only, and operation authorities such as deletion, copy and the like do not exist; the U _ key of analogized key0 is U _ key0, the U _ key of key1 is U _ key1, the U _ key of key2 is U _ key2, and the U _ key of key3 is U _ key 3;
u _ key0, defines the authority as: user assignment, KVM access rights, fault log access rights, storage management rights, PCIE card management rights, and the like;
u _ key1, defines the authority as: KVM access authority, fault log access authority, storage device management authority and PCIE card management authority;
u _ key2, defines the authority as: KVM access authority, fault log access authority;
u _ key3, defines the authority as: KVM access rights.
S2: in the mode of storing the secret key by the mobile peripheral, inputting login information on a management interface of the controlled server, and uploading the corresponding secret key to the controlled server;
in step S2, the operator logs in the management interface of the controlled server, inputs the user name and the password, logs in, and then the browser-related plug-in scans whether there is a U _ key insertion, and if there is a U _ key insertion, reads the key accessed therein, and transmits the user name, the password, and the key to the controlled server.
S3: the controlled server receives the secret key and analyzes the secret key;
in step S3, the baseboard management controller of the controlled server decrypts and checks the user name, password, and key sent from the control computer.
S4: and comparing and checking the authority to obtain a login result.
In step S4, if the user name authority and the authority analyzed by the key match, the login is allowed, and if the user name authority and the authority analyzed by the key do not match, the login is prohibited.
Example 4:
as shown in fig. 2, the present embodiment provides a remote trusted verification system based on a secret key, including:
define user key module 1: super user and normal user permissions are defined.
Uploading the key module 2: firstly, selecting a secret key storage mode, inputting login information on a management interface of a controlled server, and uploading a corresponding secret key to the controlled server;
selecting a secret key storage mode, and if the secret key is stored in the control machine, the user is required to upload the secret key to the controlled server every time login is performed;
if the key is stored for the mobile peripheral, the browser plug-in can read the key file stored in the equipment and transmit the login information and the key to the controlled server.
The key analysis module 3: the bottom plate management controller of the controlled server analyzes the uploaded secret key, analyzes the authority defined by the secret key and extracts the authority defined by the secret key;
the controlled server is provided with a server management port, and the server management port is used for receiving login information and a secret key and directly transmitting the received login information and the received secret key to a bottom plate management controller of the controlled server or transmitting the received login information and the received secret key to the bottom plate management controller of the controlled server through an intelligent network card; the baseboard management controller verifies the matching of the user name and the password.
The authority comparison checking module 4: firstly, whether login information is correct is verified, if the login information is incorrect, login fails, if the login information is correct, whether the authority which is distributed to a user name and corresponds to the extracted key authority is consistent is checked, if the authority is consistent, login succeeds, and if the authority is inconsistent, login fails.
Example 5:
the present invention provides a computer storage medium having stored therein instructions that, when run on a computer, cause the computer to perform the above-described method.
Although the present invention has been described in detail by referring to the drawings in connection with the preferred embodiments, the present invention is not limited thereto. Various equivalent modifications or substitutions can be made on the embodiments of the present invention by those skilled in the art without departing from the spirit and scope of the present invention, and these modifications or substitutions are within the scope of the present invention/any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.
Claims (10)
1. A remote credibility verification method based on secret keys is characterized by comprising the following steps:
s1: defining keys of users in different levels;
s2: selecting a key storage mode, inputting login information on a management interface of the controlled server, and uploading a corresponding key to the controlled server;
s3: the controlled server receives the secret key and analyzes the secret key;
s4: and comparing and checking the authority to obtain a login result.
2. The remote trusted verification method according to claim 1, wherein in step S1: super user and normal user permissions are defined.
3. The remote trusted testing method based on the secret key as claimed in claim 1, wherein in step S2, a secret key storage mode is selected, and if the secret key is stored in the control machine, each login requires the user to upload the secret key to the controlled server;
if the key is stored for the mobile peripheral, the browser plug-in can read the key file stored in the equipment and transmit the login information and the key to the controlled server.
4. The remote trusted testing method based on secret keys as claimed in claim 1, wherein in step S3, said controlled server sets a server management port, and said server management port is configured to receive the login information and the secret keys, and transmit the received login information and secret keys to a backplane management controller of the controlled server directly or to a backplane management controller of the controlled server through a smart card; the baseboard management controller verifies the matching of the user name and the password.
5. The method according to claim 1, wherein in step S3, a key analysis module is disposed in the baseboard management controller, and the key analysis module analyzes the uploaded key, analyzes the authority defined by the key, and extracts the authority defined by the key.
6. The key-based remote trusted testing method according to claim 1, wherein in step S4, it is first verified whether the login information is correct, and if the login information is incorrect, the login fails, and if the login information is correct, it is checked whether the authority assigned to the user name is consistent with the authority of the extracted key, and if the authority is consistent, the login succeeds, and if the authority is inconsistent, the login fails.
7. A remote trusted verification system based on keys, comprising:
defining a user key module: defining super user and common user authority;
uploading a key module: firstly, selecting a secret key storage mode, inputting login information on a management interface of a controlled server, and uploading a corresponding secret key to the controlled server;
the key analysis module: the bottom plate management controller of the controlled server analyzes the uploaded secret key, analyzes the authority defined by the secret key and extracts the authority defined by the secret key;
and the permission comparison and check module: firstly, whether login information is correct is verified, if the login information is incorrect, login fails, if the login information is correct, whether the authority which is distributed to a user name and corresponds to the extracted key authority is consistent is checked, if the authority is consistent, login succeeds, and if the authority is inconsistent, login fails.
8. The remote trusted testing system based on the secret key as claimed in claim 7, wherein in the key uploading module, a secret key storage mode is selected, and if the secret key is stored in the control machine, the user is required to upload the secret key to the controlled server every login;
if the key is stored for the mobile peripheral, the browser plug-in can read the key file stored in the equipment and transmit the login information and the key to the controlled server.
9. The remote trusted testing system based on the secret key according to claim 8, wherein in the secret key analyzing module, the controlled server is provided with a server management port, and the server management port is used for receiving the login information and the secret key and directly transmitting the received login information and the secret key to a backplane management controller of the controlled server or transmitting the login information and the secret key to the backplane management controller of the controlled server through an intelligent network card; the baseboard management controller verifies the matching of the user name and the password.
10. A computer storage medium having stored therein instructions that, when executed on a computer, cause the computer to perform the method of any one of claims 1 to 6.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110400823.3A CN113132375A (en) | 2021-04-14 | 2021-04-14 | Remote trusted verification method, system and storage medium based on secret key |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110400823.3A CN113132375A (en) | 2021-04-14 | 2021-04-14 | Remote trusted verification method, system and storage medium based on secret key |
Publications (1)
Publication Number | Publication Date |
---|---|
CN113132375A true CN113132375A (en) | 2021-07-16 |
Family
ID=76776560
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110400823.3A Pending CN113132375A (en) | 2021-04-14 | 2021-04-14 | Remote trusted verification method, system and storage medium based on secret key |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113132375A (en) |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6282649B1 (en) * | 1997-09-19 | 2001-08-28 | International Business Machines Corporation | Method for controlling access to electronically provided services and system for implementing such method |
CN1471274A (en) * | 2003-07-07 | 2004-01-28 | 江苏移动通信有限责任公司 | Internet-based smart card remote concurrent writing system |
CN101626379A (en) * | 2009-08-11 | 2010-01-13 | 深圳市融创天下科技发展有限公司 | Access management method and access management device for classifying access rights in embedded system |
CN101741860A (en) * | 2009-11-27 | 2010-06-16 | 华中科技大学 | A computer remote security control method |
CN105162775A (en) * | 2015-08-05 | 2015-12-16 | 深圳市方迪科技股份有限公司 | Logging method and device of virtual machine |
CN107689943A (en) * | 2016-08-04 | 2018-02-13 | 深圳市深信服电子科技有限公司 | A kind of method of data encryption, user terminal, server and system |
CN107992760A (en) * | 2017-12-08 | 2018-05-04 | 深圳创维数字技术有限公司 | Secret key wiring method, device, equipment and storage medium |
CN109802832A (en) * | 2017-11-17 | 2019-05-24 | 中国移动通信集团公司 | A kind of processing method of data file, system, big data processing server and computer storage medium |
CN111292438A (en) * | 2020-01-17 | 2020-06-16 | 国网浙江省电力有限公司丽水供电公司 | A UAV inspection method for information security |
-
2021
- 2021-04-14 CN CN202110400823.3A patent/CN113132375A/en active Pending
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6282649B1 (en) * | 1997-09-19 | 2001-08-28 | International Business Machines Corporation | Method for controlling access to electronically provided services and system for implementing such method |
CN1471274A (en) * | 2003-07-07 | 2004-01-28 | 江苏移动通信有限责任公司 | Internet-based smart card remote concurrent writing system |
CN101626379A (en) * | 2009-08-11 | 2010-01-13 | 深圳市融创天下科技发展有限公司 | Access management method and access management device for classifying access rights in embedded system |
CN101741860A (en) * | 2009-11-27 | 2010-06-16 | 华中科技大学 | A computer remote security control method |
CN105162775A (en) * | 2015-08-05 | 2015-12-16 | 深圳市方迪科技股份有限公司 | Logging method and device of virtual machine |
CN107689943A (en) * | 2016-08-04 | 2018-02-13 | 深圳市深信服电子科技有限公司 | A kind of method of data encryption, user terminal, server and system |
CN109802832A (en) * | 2017-11-17 | 2019-05-24 | 中国移动通信集团公司 | A kind of processing method of data file, system, big data processing server and computer storage medium |
CN107992760A (en) * | 2017-12-08 | 2018-05-04 | 深圳创维数字技术有限公司 | Secret key wiring method, device, equipment and storage medium |
CN111292438A (en) * | 2020-01-17 | 2020-06-16 | 国网浙江省电力有限公司丽水供电公司 | A UAV inspection method for information security |
Non-Patent Citations (2)
Title |
---|
李莉等: "共享文件加密存储分级访问控制方案的实现", 《网络与信息安全学报》 * |
王全彬: "基于混合加密算法的数据加密技术及其应用", 《数字技术与应用》 * |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106330850B (en) | Security verification method based on biological characteristics, client and server | |
US7873835B2 (en) | Accessing data storage devices | |
CN110708156B (en) | Communication method, client and server | |
US20210334085A1 (en) | Systems and methods for secure over-the-air updates for cyber-physical systems | |
WO2021137684A1 (en) | System and method for integrating digital identity verification to authentication platform | |
CN105243314A (en) | USB-key based security system and usage method therefor | |
US20220417020A1 (en) | Information processing device, information processing method, and non-transitory computer readable storage medium | |
CN115086090A (en) | Network login authentication method and device based on UKey | |
US11822648B2 (en) | Systems and methods for remote anomaly data scanner for cyber-physical systems | |
CN113132375A (en) | Remote trusted verification method, system and storage medium based on secret key | |
JP2022544840A (en) | Data storage device to which variable computer file system is applied | |
CN117389974A (en) | File secure sharing method based on super fusion system | |
Hajar et al. | A Review of Penetration Testing Process For Sql Injection Attack | |
CN114499992A (en) | Login method, system, user equipment and storage medium | |
CN105790935A (en) | Independent-software-and-hardware-technology-based trusted authentication server | |
CN108347411B (en) | Unified security guarantee method, firewall system, equipment and storage medium | |
CN113162936B (en) | Method and system for preventing abnormal dynamic analysis | |
Bhatia et al. | Vulnerability Assessment and Penetration Testing | |
CN114238922A (en) | Login identity verification method and device | |
KR102265129B1 (en) | Storage media control system and control metohd thereof | |
KR102648908B1 (en) | User authentication system and method | |
Muniraman et al. | A practical approach to include security in software development | |
KR102181445B1 (en) | Electronic Approval Method Using Palm Vein | |
RU2648942C1 (en) | System of protection of information from unauthorized access | |
Fgee et al. | My Security for Dynamic Websites in Educational Institution |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20210716 |