[go: up one dir, main page]

CN113132375A - Remote trusted verification method, system and storage medium based on secret key - Google Patents

Remote trusted verification method, system and storage medium based on secret key Download PDF

Info

Publication number
CN113132375A
CN113132375A CN202110400823.3A CN202110400823A CN113132375A CN 113132375 A CN113132375 A CN 113132375A CN 202110400823 A CN202110400823 A CN 202110400823A CN 113132375 A CN113132375 A CN 113132375A
Authority
CN
China
Prior art keywords
key
authority
secret key
controlled server
login
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110400823.3A
Other languages
Chinese (zh)
Inventor
龚诗悦
邱连兴
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shandong Yingxin Computer Technology Co Ltd
Original Assignee
Shandong Yingxin Computer Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shandong Yingxin Computer Technology Co Ltd filed Critical Shandong Yingxin Computer Technology Co Ltd
Priority to CN202110400823.3A priority Critical patent/CN113132375A/en
Publication of CN113132375A publication Critical patent/CN113132375A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The invention relates to a remote credibility inspection method, a system and a storage medium based on a secret key, comprising the following steps: s1: defining keys of users in different levels; s2: selecting a key storage mode, inputting login information on a management interface of the controlled server, and uploading a corresponding key to the controlled server; s3: the controlled server receives the secret key and analyzes the secret key; s4: and comparing and checking the authority to obtain a login result.

Description

Remote trusted verification method, system and storage medium based on secret key
Technical Field
The invention belongs to the technical field of remote trusted inspection methods, and particularly relates to a remote trusted inspection method and system based on a secret key and a storage medium.
Background
With the development of cloud computing applications, information security becomes more important. When the system of the server is tampered, the server is easy to attack, and security risks exist. In the prior art, in order to prevent a system of a server from being tampered, the server assigns different levels of authority by setting different users.
However, the authority is distributed through the user name and the password, so that the user can be easily cracked and confidential information can be obtained; especially, high-authority users such as root users have a very high operable range, and once cracked or leaked, the high-authority users bring a very large risk to the safety of the whole system. This is a technical problem in the prior art.
In view of the above, the present invention provides a remote trusted verification method, system and storage medium based on secret key; to solve the defects and problems in the prior art.
Disclosure of Invention
Aiming at the defects that in the prior art, the authority is distributed through a user name and a password, and the authority is easy to crack and acquire confidential information, the problem of bringing great risk to the security of the system is solved; the invention provides a remote credibility inspection method, a system and a storage medium based on a secret key, which aim to solve the technical problems.
In order to achieve the purpose, the invention provides the following technical scheme:
in a first aspect, the present invention provides a remote trusted verification method based on a secret key, including the following steps:
s1: defining keys of users in different levels;
s2: selecting a key storage mode, inputting login information on a management interface of the controlled server, and uploading a corresponding key to the controlled server;
s3: the controlled server receives the secret key and analyzes the secret key;
s4: and comparing and checking the authority to obtain a login result.
Preferably, in step S1: super user and normal user permissions are defined.
Preferably, in step S2, a key storage manner is selected, and if the control machine stores the key, the user is required to upload the key to the controlled server every login;
if the key is stored for the mobile peripheral, the browser plug-in can read the key file stored in the equipment and transmit the login information and the key to the controlled server.
The effect of this step is: the controlled server receives the key in different ways under different storage ways of the key.
Preferably, in step S2, the login information includes a user name and a password.
Preferably, in step S3, the controlled server is provided with a server management port, and the server management port is configured to receive the login information and the key, and transmit the received login information and the received key directly to the backplane management controller of the controlled server, or transmit the login information and the received key to the backplane management controller of the controlled server through the smart card; the baseboard management controller verifies the matching of the user name and the password.
Preferably, in step S3, a key analysis module is disposed in the baseboard management controller, and the key analysis module analyzes the uploaded key, analyzes the authority defined by the key, and extracts the authority defined by the key.
The effect of this step is: the authority defined by the key can be analyzed and extracted from the uploaded key.
Preferably, in step S4, it is first verified whether the login information is correct, if the login information is incorrect, the login fails, if the login information is correct, it is checked whether the assigned authority corresponding to the user name is consistent with the extracted authority of the key, if the authority is consistent, the login succeeds, and if the authority is inconsistent, the login fails.
In a second aspect, the present invention provides a remote trusted verification system based on secret keys, including:
defining a user key module: defining super user and common user authority;
uploading a key module: firstly, selecting a secret key storage mode, inputting login information on a management interface of a controlled server, and uploading a corresponding secret key to the controlled server;
the key analysis module: the bottom plate management controller of the controlled server analyzes the uploaded secret key, analyzes the authority defined by the secret key and extracts the authority defined by the secret key;
and the permission comparison and check module: firstly, whether login information is correct is verified, if the login information is incorrect, login fails, if the login information is correct, whether the authority which is distributed to a user name and corresponds to the extracted key authority is consistent is checked, if the authority is consistent, login succeeds, and if the authority is inconsistent, login fails.
Preferably, in the key uploading module, a key storage mode is selected, and if the key is stored in the control machine, the user is required to upload the key to the controlled server every time login is performed;
if the key is stored for the mobile peripheral, the browser plug-in can read the key file stored in the equipment and transmit the login information and the key to the controlled server.
Preferably, in the upload key module, the login information includes a user name and a password.
Preferably, in the key analysis module, the controlled server is provided with a server management port, and the server management port is used for receiving the login information and the key and directly transmitting the received login information and the received key to a backplane management controller of the controlled server or transmitting the received login information and the received key to the backplane management controller of the controlled server through an intelligent network card; the baseboard management controller verifies the matching of the user name and the password.
In a third aspect, the present invention provides a computer storage medium having stored therein instructions that, when run on a computer, cause the computer to perform the above-described method.
The method has the advantages that on the basis that the super user adds other levels of users and authorities, secret key management and control is added, the secret key can be in a file form, can be directly uploaded on a login page, can also be in an extrapolation hardware form, and can be read by a browser plug-in. And after the user name, the password and the secret key pass the check of the controlled server, the user successfully logs in and carries out the operation in the related authority. The risk caused by acquiring the corresponding authority only by the user name and the password is reduced, and the security level of the system is improved.
In addition, the invention has reliable design principle, simple structure and very wide application prospect.
Drawings
In order to more clearly illustrate the embodiments or technical solutions in the prior art of the present invention, the drawings used in the description of the embodiments or prior art will be briefly described below, and it is obvious for those skilled in the art that other drawings can be obtained based on these drawings without creative efforts.
Fig. 1 is a flowchart of a remote feasibility verification method based on a secret key according to embodiment 1 of the present invention.
Fig. 2 is a schematic block diagram of a remote feasibility verification system based on a secret key according to embodiment 4 of the present invention.
The system comprises a user key definition module, an uploading key module, a 3-key analysis module and a 4-authority comparison and inspection module, wherein the user key definition module, the uploading key module, the authority comparison and inspection module and the authority comparison and inspection module are respectively arranged in the system.
Detailed Description
In order to make those skilled in the art better understand the technical solution of the present invention, the technical solution in the embodiment of the present invention will be clearly and completely described below with reference to the drawings in the embodiment of the present invention, and it is obvious that the described embodiment is only a part of the embodiment of the present invention, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Example 1:
as shown in fig. 1, the present embodiment provides a remote trusted verification method based on a secret key, including the following steps:
s1: defining keys of users in different levels;
in the step S1: super user and normal user permissions are defined.
S2: selecting a secret key storage mode, inputting a user name and a password on a management interface of the controlled server, and uploading a corresponding secret key to the controlled server;
in the step S2, selecting a key storage mode, and if the controller stores the key, the user is required to upload the key to the controlled server every time login;
if the key is stored for the mobile peripheral, the browser plug-in can read the key file stored in the equipment and transmit the login information and the key to the controlled server.
The effect of this step is: the controlled server receives the key in different ways under different storage ways of the key.
S3: the controlled server receives the secret key and analyzes the secret key;
in step S3, the controlled server sets a server management port, where the server management port is configured to receive the login information and the key, and directly transmit the received login information and the received key to the backplane management controller of the controlled server, or transmit the received login information and the received key to the backplane management controller of the controlled server through the smart card. The baseboard management controller verifies the matching of the user name and the password. And a secret key analysis module is arranged in the bottom plate management controller and is used for analyzing the uploaded secret key, analyzing the authority defined by the secret key and extracting the authority defined by the secret key.
The effect of this step is: the uploaded secret key can be received through the server management port, then the uploaded secret key is analyzed through the secret key analysis module, and the authority defined by the secret key is extracted.
S4: comparing and checking the authority to obtain a login result;
in step S4, it is first verified whether the login information is correct, if the login information is incorrect, the login fails, if the login information is correct, it is checked whether the assigned authority corresponding to the user name is consistent with the extracted authority of the key, if the authority is consistent, the login succeeds, and if the authority is inconsistent, the login fails.
Example 2:
the embodiment provides a remote trusted verification method based on a secret key, which comprises the following steps:
s1: defining keys of users in different levels;
in step S1, the super-user key0, the class a user key1, the class B user key2, and the class C user key 3;
the key0 defines the rights as: user allocation, KVM access authority, fault log access authority, storage device management authority and PCIE card management authority;
the key1 defines the rights as: KVM access authority, fault log access authority, storage device management authority and PCIE card management authority;
the key2 defines the rights as: KVM access authority, fault log access authority;
the key3 defines the rights as: KVM access rights.
S2: in the method of storing the secret key by the control machine, login information is input on a management interface of the controlled server, and the corresponding secret key is uploaded to the controlled server;
in step S2, the control computer remotely logs in the management interface of the controlled server, inputs root user name and password, and uploads the corresponding key 0.
S3: the controlled server receives the secret key and analyzes the secret key;
in step S3, the user name, the password, and the key are transmitted to the baseboard management controller of the controlled server, and the baseboard management controller checks the match between the user name and the password, and analyzes the uploaded key through the key analysis module, and analyzes the user right from the key.
S4: comparing and checking the authority to obtain a login result;
in step S4, the authority already assigned to the user name and the authority resolved from the key are checked, and if the check is consistent, the login is successful, and the super user may perform operations in the relevant authority.
In this embodiment, in the user management interface, the super user configures a class a user, sets the user name as adminl and the password as 111111, and allocates the KVM access authority, the fault log access authority, the storage device management authority, and the PCIE card management authority.
The A-level user admin1 logs in the controlled server management interface and inputs the user name: admin1, password: 111111, and upload key0, the user name, password, and key will be analyzed and checked in the bmc, since the user is class a, the key0, and the admin1 right after checking does not match the defined right in the key, so login is prohibited.
The A-level user admin1 logs in the controlled server management interface and inputs the user name: admin1, password: 111111, and upload key1, the user name, password, and key will be analyzed and checked in the baseboard management controller, since the authority defined in the key is consistent with the authority set by admin1 user, it is possible to log in the management interface and perform the operation within the authority.
Example 3:
the embodiment provides a remote trusted verification method based on a secret key, which comprises the following steps:
s1: defining keys of users in different levels;
in step S1, the secret key is provided to the operator in the form of a component, where the component is mainly a USB interface and the name of the component is set to U _ key;
the secret key file exists in the U _ key, the authority of the component is read only, and operation authorities such as deletion, copy and the like do not exist; the U _ key of analogized key0 is U _ key0, the U _ key of key1 is U _ key1, the U _ key of key2 is U _ key2, and the U _ key of key3 is U _ key 3;
u _ key0, defines the authority as: user assignment, KVM access rights, fault log access rights, storage management rights, PCIE card management rights, and the like;
u _ key1, defines the authority as: KVM access authority, fault log access authority, storage device management authority and PCIE card management authority;
u _ key2, defines the authority as: KVM access authority, fault log access authority;
u _ key3, defines the authority as: KVM access rights.
S2: in the mode of storing the secret key by the mobile peripheral, inputting login information on a management interface of the controlled server, and uploading the corresponding secret key to the controlled server;
in step S2, the operator logs in the management interface of the controlled server, inputs the user name and the password, logs in, and then the browser-related plug-in scans whether there is a U _ key insertion, and if there is a U _ key insertion, reads the key accessed therein, and transmits the user name, the password, and the key to the controlled server.
S3: the controlled server receives the secret key and analyzes the secret key;
in step S3, the baseboard management controller of the controlled server decrypts and checks the user name, password, and key sent from the control computer.
S4: and comparing and checking the authority to obtain a login result.
In step S4, if the user name authority and the authority analyzed by the key match, the login is allowed, and if the user name authority and the authority analyzed by the key do not match, the login is prohibited.
Example 4:
as shown in fig. 2, the present embodiment provides a remote trusted verification system based on a secret key, including:
define user key module 1: super user and normal user permissions are defined.
Uploading the key module 2: firstly, selecting a secret key storage mode, inputting login information on a management interface of a controlled server, and uploading a corresponding secret key to the controlled server;
selecting a secret key storage mode, and if the secret key is stored in the control machine, the user is required to upload the secret key to the controlled server every time login is performed;
if the key is stored for the mobile peripheral, the browser plug-in can read the key file stored in the equipment and transmit the login information and the key to the controlled server.
The key analysis module 3: the bottom plate management controller of the controlled server analyzes the uploaded secret key, analyzes the authority defined by the secret key and extracts the authority defined by the secret key;
the controlled server is provided with a server management port, and the server management port is used for receiving login information and a secret key and directly transmitting the received login information and the received secret key to a bottom plate management controller of the controlled server or transmitting the received login information and the received secret key to the bottom plate management controller of the controlled server through an intelligent network card; the baseboard management controller verifies the matching of the user name and the password.
The authority comparison checking module 4: firstly, whether login information is correct is verified, if the login information is incorrect, login fails, if the login information is correct, whether the authority which is distributed to a user name and corresponds to the extracted key authority is consistent is checked, if the authority is consistent, login succeeds, and if the authority is inconsistent, login fails.
Example 5:
the present invention provides a computer storage medium having stored therein instructions that, when run on a computer, cause the computer to perform the above-described method.
Although the present invention has been described in detail by referring to the drawings in connection with the preferred embodiments, the present invention is not limited thereto. Various equivalent modifications or substitutions can be made on the embodiments of the present invention by those skilled in the art without departing from the spirit and scope of the present invention, and these modifications or substitutions are within the scope of the present invention/any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (10)

1. A remote credibility verification method based on secret keys is characterized by comprising the following steps:
s1: defining keys of users in different levels;
s2: selecting a key storage mode, inputting login information on a management interface of the controlled server, and uploading a corresponding key to the controlled server;
s3: the controlled server receives the secret key and analyzes the secret key;
s4: and comparing and checking the authority to obtain a login result.
2. The remote trusted verification method according to claim 1, wherein in step S1: super user and normal user permissions are defined.
3. The remote trusted testing method based on the secret key as claimed in claim 1, wherein in step S2, a secret key storage mode is selected, and if the secret key is stored in the control machine, each login requires the user to upload the secret key to the controlled server;
if the key is stored for the mobile peripheral, the browser plug-in can read the key file stored in the equipment and transmit the login information and the key to the controlled server.
4. The remote trusted testing method based on secret keys as claimed in claim 1, wherein in step S3, said controlled server sets a server management port, and said server management port is configured to receive the login information and the secret keys, and transmit the received login information and secret keys to a backplane management controller of the controlled server directly or to a backplane management controller of the controlled server through a smart card; the baseboard management controller verifies the matching of the user name and the password.
5. The method according to claim 1, wherein in step S3, a key analysis module is disposed in the baseboard management controller, and the key analysis module analyzes the uploaded key, analyzes the authority defined by the key, and extracts the authority defined by the key.
6. The key-based remote trusted testing method according to claim 1, wherein in step S4, it is first verified whether the login information is correct, and if the login information is incorrect, the login fails, and if the login information is correct, it is checked whether the authority assigned to the user name is consistent with the authority of the extracted key, and if the authority is consistent, the login succeeds, and if the authority is inconsistent, the login fails.
7. A remote trusted verification system based on keys, comprising:
defining a user key module: defining super user and common user authority;
uploading a key module: firstly, selecting a secret key storage mode, inputting login information on a management interface of a controlled server, and uploading a corresponding secret key to the controlled server;
the key analysis module: the bottom plate management controller of the controlled server analyzes the uploaded secret key, analyzes the authority defined by the secret key and extracts the authority defined by the secret key;
and the permission comparison and check module: firstly, whether login information is correct is verified, if the login information is incorrect, login fails, if the login information is correct, whether the authority which is distributed to a user name and corresponds to the extracted key authority is consistent is checked, if the authority is consistent, login succeeds, and if the authority is inconsistent, login fails.
8. The remote trusted testing system based on the secret key as claimed in claim 7, wherein in the key uploading module, a secret key storage mode is selected, and if the secret key is stored in the control machine, the user is required to upload the secret key to the controlled server every login;
if the key is stored for the mobile peripheral, the browser plug-in can read the key file stored in the equipment and transmit the login information and the key to the controlled server.
9. The remote trusted testing system based on the secret key according to claim 8, wherein in the secret key analyzing module, the controlled server is provided with a server management port, and the server management port is used for receiving the login information and the secret key and directly transmitting the received login information and the secret key to a backplane management controller of the controlled server or transmitting the login information and the secret key to the backplane management controller of the controlled server through an intelligent network card; the baseboard management controller verifies the matching of the user name and the password.
10. A computer storage medium having stored therein instructions that, when executed on a computer, cause the computer to perform the method of any one of claims 1 to 6.
CN202110400823.3A 2021-04-14 2021-04-14 Remote trusted verification method, system and storage medium based on secret key Pending CN113132375A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110400823.3A CN113132375A (en) 2021-04-14 2021-04-14 Remote trusted verification method, system and storage medium based on secret key

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110400823.3A CN113132375A (en) 2021-04-14 2021-04-14 Remote trusted verification method, system and storage medium based on secret key

Publications (1)

Publication Number Publication Date
CN113132375A true CN113132375A (en) 2021-07-16

Family

ID=76776560

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110400823.3A Pending CN113132375A (en) 2021-04-14 2021-04-14 Remote trusted verification method, system and storage medium based on secret key

Country Status (1)

Country Link
CN (1) CN113132375A (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6282649B1 (en) * 1997-09-19 2001-08-28 International Business Machines Corporation Method for controlling access to electronically provided services and system for implementing such method
CN1471274A (en) * 2003-07-07 2004-01-28 江苏移动通信有限责任公司 Internet-based smart card remote concurrent writing system
CN101626379A (en) * 2009-08-11 2010-01-13 深圳市融创天下科技发展有限公司 Access management method and access management device for classifying access rights in embedded system
CN101741860A (en) * 2009-11-27 2010-06-16 华中科技大学 A computer remote security control method
CN105162775A (en) * 2015-08-05 2015-12-16 深圳市方迪科技股份有限公司 Logging method and device of virtual machine
CN107689943A (en) * 2016-08-04 2018-02-13 深圳市深信服电子科技有限公司 A kind of method of data encryption, user terminal, server and system
CN107992760A (en) * 2017-12-08 2018-05-04 深圳创维数字技术有限公司 Secret key wiring method, device, equipment and storage medium
CN109802832A (en) * 2017-11-17 2019-05-24 中国移动通信集团公司 A kind of processing method of data file, system, big data processing server and computer storage medium
CN111292438A (en) * 2020-01-17 2020-06-16 国网浙江省电力有限公司丽水供电公司 A UAV inspection method for information security

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6282649B1 (en) * 1997-09-19 2001-08-28 International Business Machines Corporation Method for controlling access to electronically provided services and system for implementing such method
CN1471274A (en) * 2003-07-07 2004-01-28 江苏移动通信有限责任公司 Internet-based smart card remote concurrent writing system
CN101626379A (en) * 2009-08-11 2010-01-13 深圳市融创天下科技发展有限公司 Access management method and access management device for classifying access rights in embedded system
CN101741860A (en) * 2009-11-27 2010-06-16 华中科技大学 A computer remote security control method
CN105162775A (en) * 2015-08-05 2015-12-16 深圳市方迪科技股份有限公司 Logging method and device of virtual machine
CN107689943A (en) * 2016-08-04 2018-02-13 深圳市深信服电子科技有限公司 A kind of method of data encryption, user terminal, server and system
CN109802832A (en) * 2017-11-17 2019-05-24 中国移动通信集团公司 A kind of processing method of data file, system, big data processing server and computer storage medium
CN107992760A (en) * 2017-12-08 2018-05-04 深圳创维数字技术有限公司 Secret key wiring method, device, equipment and storage medium
CN111292438A (en) * 2020-01-17 2020-06-16 国网浙江省电力有限公司丽水供电公司 A UAV inspection method for information security

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
李莉等: "共享文件加密存储分级访问控制方案的实现", 《网络与信息安全学报》 *
王全彬: "基于混合加密算法的数据加密技术及其应用", 《数字技术与应用》 *

Similar Documents

Publication Publication Date Title
CN106330850B (en) Security verification method based on biological characteristics, client and server
US7873835B2 (en) Accessing data storage devices
CN110708156B (en) Communication method, client and server
US20210334085A1 (en) Systems and methods for secure over-the-air updates for cyber-physical systems
WO2021137684A1 (en) System and method for integrating digital identity verification to authentication platform
CN105243314A (en) USB-key based security system and usage method therefor
US20220417020A1 (en) Information processing device, information processing method, and non-transitory computer readable storage medium
CN115086090A (en) Network login authentication method and device based on UKey
US11822648B2 (en) Systems and methods for remote anomaly data scanner for cyber-physical systems
CN113132375A (en) Remote trusted verification method, system and storage medium based on secret key
JP2022544840A (en) Data storage device to which variable computer file system is applied
CN117389974A (en) File secure sharing method based on super fusion system
Hajar et al. A Review of Penetration Testing Process For Sql Injection Attack
CN114499992A (en) Login method, system, user equipment and storage medium
CN105790935A (en) Independent-software-and-hardware-technology-based trusted authentication server
CN108347411B (en) Unified security guarantee method, firewall system, equipment and storage medium
CN113162936B (en) Method and system for preventing abnormal dynamic analysis
Bhatia et al. Vulnerability Assessment and Penetration Testing
CN114238922A (en) Login identity verification method and device
KR102265129B1 (en) Storage media control system and control metohd thereof
KR102648908B1 (en) User authentication system and method
Muniraman et al. A practical approach to include security in software development
KR102181445B1 (en) Electronic Approval Method Using Palm Vein
RU2648942C1 (en) System of protection of information from unauthorized access
Fgee et al. My Security for Dynamic Websites in Educational Institution

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20210716