CN109981528A - A method of protection user information safety - Google Patents
A method of protection user information safety Download PDFInfo
- Publication number
- CN109981528A CN109981528A CN201711449093.6A CN201711449093A CN109981528A CN 109981528 A CN109981528 A CN 109981528A CN 201711449093 A CN201711449093 A CN 201711449093A CN 109981528 A CN109981528 A CN 109981528A
- Authority
- CN
- China
- Prior art keywords
- user
- login
- log
- user information
- logging
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0815—Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
- H04L63/205—Network architectures or network communication protocols for network security for managing network security; network security policies in general involving negotiation or determination of the one or more network security mechanisms to be used, e.g. by negotiation between the client and the server or between peers or by selection according to the capabilities of the entities involved
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Debugging And Monitoring (AREA)
Abstract
The present invention relates to technical field of system security, disclose the method for protection user information safety, the method comprising the steps of: login system;Situation is logged in user and carries out real-time monitoring, judges to log in exception, then system sends abnormal prompt to user;It is carried out logging in track inquiry according to abnormal prompt selection;Inquiry instruction is sent to system, system receives inquiry instruction and carries out query processing to whole tracks that log in of user, and is formed and log in track query result;Judge that selection carries out security maintenance according to query result;Security maintenance instruction is sent to system, system receives security maintenance instruction and carries out security maintenance processing to the user information of user.This method makes system have login track query function; and has the function of security maintenance; whole tracks that log in of user can be inquired; when user has found oneself user information, there are when security risk; carry out security maintenance; user information is played and is effectively protected, the safety of user information is improved.
Description
Technical field
The present invention relates to technical field of system security, in particular to a kind of method for protecting user information safety.
Background technique
With the rapidly development of the development of information technology, especially e-commerce, so that the application of mobile terminal App is increasingly
Extensively, when people using all kinds of websites and mobile terminal App when being obtained information, giving out information or carry out consumption activity, just
It needs to carry out user information registration, and logs in the service that could use completion with the user of successful registration, so, user information
Safety it is particularly significant.
With current situation, all kinds of different websites, mobile terminal App customer relationship do not get through, it is all individually separated
Storage and management, in such a case, it is easy to which the situation that user information leakage occurs then is slapped when user information is leaked
The people for holding the user information can log in corresponding system, make user's damage of the rights and interests, but in the prior art, Yong Huwu
Method grasps the Account Logon track of oneself completely, can not understand the Account Logon situation of oneself, and therefore, user information has peace
Full hidden danger.
Summary of the invention
The present invention provides a kind of method for protecting user information safety, the method for the protection user information safety makes system
With track query function is logged in, and have the function of security maintenance, whole login tracks of user can be inquired, when with
Family finds that the user information of oneself there are when security risk, can carry out security maintenance, play and be effectively protected to user information,
Effectively raise the safety of user information.
In order to achieve the above objectives, the present invention the following technical schemes are provided:
A method of protection user information safety, comprising steps of
S101, login system, the system generate a security information library to the secure log condition information of login user;
S102, situation progress real-time monitoring is logged in user, and judge the login condition information detected and the peace
Whether the information of full information library record conflicts, if clashing, judges to log in exception, then the system sends abnormal mention to user
Show, into S103;Exception if not logged in and user's selection carry out logging in track inquiry, into S104;
S103, chosen whether log in track inquiry according to the abnormal prompt: selection carries out logging in track inquiry, into
Enter S104;Or, selection is ended processing without logging in track inquiry;
S104, inquiry instruction is sent to system, the system receives the inquiry instruction and logs in rail to the whole of user
Mark carries out query processing, and is formed and log in track query result;
S105, judged according to the query result and choose whether to carry out security maintenance: selection carries out security maintenance, enters
S106;Or, selection is ended processing without security maintenance;
S106, Xiang Suoshu system send security maintenance instruction, and the system receives security maintenance instruction and to the use of user
Family information carries out security maintenance processing.
In the method for above-mentioned protection user information safety, user uses account login system, and system can be to login user
The security information library for generating the secure log situation of record login user is logged in every time, and system carries out the login situation of user real
When monitor, as long as that is, user system occur login behavior, system can monitor, and system stepping on each time to user
Record situation is detected and whether the information for judging that the login condition information detected is recorded with security information library clashes, if
It clashes, is judged as logging in exception, then send abnormal prompt to user to prompt user, user is according in abnormal prompt
Hold autonomous judgement to choose whether log in track inquiry, if user's selection carries out logging in track inquiry, user is grasped
Make to send inquiry instruction to system, if terminating the processing to track inquiry is logged in without logging in track inquiry;Work as user
Selection carry out log in track inquiry, then user operated to system send inquiry instruction when, system receive inquiry instruction into
Row inquires whole tracks that log in of user, and forms the login track inquiry knot including the information recorded in security information library
Fruit, the whole of account that such user can understand oneself by logging in track log in track, and in turn, user can be according to login
Track query result judges oneself user information with the presence or absence of security risk, when user's judgement is there are when security risk, user
Can carry out operation row system transmission security maintenance instruction will be to the user of user after system receives security maintenance instruction
Information carries out security maintenance processing, ensures the safety of user information, and when user's judgement is there is no when security risk, end is to safety
The processing of maintenance, i.e., without security maintenance operation processing;In addition, when system does not monitor to log in unusual condition, user
Can also voluntarily activation system login track query function, send inquiry instruction to system, system carries out subsequent login rail
Mark query processing, such as above-mentioned query processing process, details are not described herein again, in this way, system, which has, logs in track to the whole of user
Query function, family can be used understand the whole of oneself and log in tracks, judge the safety of login user, and can be pacified
Full maintenance processing, effectively raises the safety of user information.
In the method for above-mentioned protection user information safety, there is system and log in track query function, and there is safety dimension
Protective function can inquire whole tracks that log in of user, and when user has found oneself user information, there are security risks
When, security maintenance can be carried out, user information is played and is effectively protected, effectively raises the safety of user information.
It preferably, include the inquiry for logging in exception information and whether carrying out login track inquiry in the abnormal prompt
Information.
Preferably, in the security information library element of secure log condition information include: login user identity,
Login time logs in place and logging device.
Preferably, the login exception includes:
It carries out frequently logging on operation;And/or
Carry out different-place login operation;And/or
Register is carried out on the logging device different from initial log equipment.
Preferably, the login place includes network segment mark.
Preferably, the logging device includes: mobile terminal and desktop computer.
Preferably, in step s 102, further includes:
For the system monitoring to when logging in abnormal, the system also sends registration prompt;
It is prompted according to the abnormal prompt and registration, Xiang Suoshu system sends authorized order or refusal instruction;
The system receives the authorized order and passes through registration;
It logins successfully;
It instructs or, the system receives the refusal and refuses registration;
Login failure.
Preferably, the login is abnormal further include: login failure.
Preferably, further includes:
The system sets a log duration to login time;
Continue no operant activity in the log duration after system monitoring to user logins successfully and surpasses
Out when the log duration, this time logging in for user is subjected to crash handling.
Preferably, step S106, send security maintenance instruction to system, the system receive security maintenance instruction and to
Family information carry out security maintenance processing specific steps include:
Account freezing application is sent to the system, the system receives the account freezing application and the account is freezed
Application, by the account freezing, the safety of the whole before the account freezing application sending time is believed after
Cease the equal kick out of information in library.
Detailed description of the invention
Fig. 1 is the method flow schematic diagram of protection user information safety provided in an embodiment of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on
Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other
Embodiment shall fall within the protection scope of the present invention.
Referring to FIG. 1, a kind of method for protecting user information safety provided in an embodiment of the present invention, comprising steps of
Step S101, login system, system generate a security information library to the secure log condition information of login user;
Step S102, situation is logged in user and carries out real-time monitoring, and judge the login condition information detected and peace
Whether the information of full information library record conflicts, if clashing, judges to log in exception, then system sends abnormal prompt to user,
Enter step S103;Exception if not logged in and user's selection carry out logging in track inquiry, enter step S104;
Step S103, chosen whether log in track inquiry according to abnormal prompt: selection carries out logging in track inquiry, into
Enter step S104;Or, selection is ended processing without logging in track inquiry;
Step S104, send inquiry instruction to system, system receive inquiry instruction and to user it is whole log in tracks into
Row query processing, and formed and log in track query result;
Step S105, judged according to query result and choose whether to carry out security maintenance: selection carries out security maintenance, enters
S106;Or, selection is ended processing without security maintenance;
Step S106, security maintenance instruction is sent to system, system receives security maintenance instruction and believes the user of user
Breath carries out security maintenance processing.
In the method for above-mentioned protection user information safety, user uses account login system, and system can be to login user
The security information library for generating the secure log situation of record login user is logged in every time, and system carries out the login situation of user real
When monitor, as long as that is, user system occur login behavior, system can monitor, and system stepping on each time to user
Record situation is detected and whether the information for judging that the login condition information detected is recorded with security information library clashes, if
It clashes, is judged as logging in exception, then send abnormal prompt to user to prompt user, user is according in abnormal prompt
Hold autonomous judgement to choose whether log in track inquiry, if user's selection carries out logging in track inquiry, user is grasped
Make to send inquiry instruction to system, if terminating the processing to track inquiry is logged in without logging in track inquiry;Work as user
Selection carry out log in track inquiry, then user operated to system send inquiry instruction when, system receive inquiry instruction into
Row inquires whole tracks that log in of user, and forms the login track inquiry knot including the information recorded in security information library
Fruit, the whole of account that such user can understand oneself by logging in track log in track, and in turn, user can be according to login
Track query result judges oneself user information with the presence or absence of security risk, when user's judgement is there are when security risk, user
Can carry out operation row system transmission security maintenance instruction will be to the user of user after system receives security maintenance instruction
Information carries out security maintenance processing, ensures the safety of user information, and when user's judgement is there is no when security risk, end is to safety
The processing of maintenance, i.e., without security maintenance operation processing;In addition, when system does not monitor to log in unusual condition, user
Can also voluntarily activation system login track query function, send inquiry instruction to system, system carries out subsequent login rail
Mark query processing, such as above-mentioned query processing process, details are not described herein again, in this way, system, which has, logs in track to the whole of user
Query function, family can be used understand the whole of oneself and log in tracks, judge the safety of login user, and can be pacified
Full maintenance processing, effectively raises the safety of user information.
In the method for above-mentioned protection user information safety, there is system and log in track query function, and there is safety dimension
Protective function can inquire whole tracks that log in of user, and when user has found oneself user information, there are security risks
When, security maintenance can be carried out, user information is played and is effectively protected, effectively raises the safety of user information.
Specifically, in the method for above-mentioned protection user information safety, in abnormal prompt include log in exception information and whether
Log in the inquiry message of track inquiry.Logging in exception information includes the information recorded in security information library, understands user
About the information for the register for occurring to log in exception, security risk is judged whether there is convenient for user, when user judges exist
When security risk, whether can carry out directly sending inquiry instruction to system in the inquiry message for logging in track inquiry, be convenient for
User log in the inquiry operation of track.
Specifically, the element of secure log condition information includes: the identity of login user, logs in security information library
Time logs in place and logging device.The identity of login user is login account of the user in system, in order to system pair
The status differentiation of login user, login time, i.e., the time point of register and after logining successfully in the log duration of system,
Geographical location where when logging in place, i.e. logging in system by user, the login used of when logging device, i.e. logging in system by user are set
It is standby, such as mobile phone, computer, or other electronic equipments, more than the element of secure log condition information includes in security information library
Element, detailed understandings login situation when user query being allow to log in track, the judgement convenient for user to login situation, favorably
It is more effective to the protection of the safety of user information in recognizing whether security risk, improve the safety of user information.
Specifically, logging in abnormal includes: to carry out frequently logging on operation;And/or carry out different-place login operation;And/or
Register is carried out on the logging device different from initial log equipment.When user carried out repeatedly logging in behaviour within the regular hour
Make, the time interval between adjacent register twice is shorter, and no matter whether register succeeds, and is considered as and frequently logs on behaviour
Make;When user account be different from formerly logged in place place log in, be considered as different-place login operation, wherein formerly step on
Recording place is the place logined successfully before last time logs in;When the account of user is being different from first logging device
Equipment logs in, and is considered as on the logging device different from initial log equipment and carries out register, wherein first logging device is most
The equipment logined successfully before primary login afterwards logs in abnormal log in including one of above-mentioned three kinds of register situations and grasps
Make the combination of arbitrary two kinds of registers or above-mentioned three kinds of register shapes in situation or above-mentioned three kinds of register situations
The combination of whole register situations in condition can make system more fully log in situation to user and detect, and be conducive to pair
User information protect, and improves the safety of user information.
Specifically, logging in place includes network segment mark.In many cases, people use Intranet in a certain range, then when
User is considered as identical login place when any point of Intranet logs in.
Specifically, logging device includes: mobile terminal, desktop computer.Mobile terminal includes mobile phone, tablet computer, pen
Remember this computer etc.;Desktop computer include: desktop computer and it is fixed can login system equipment.It should be noted that
Logging device in the present embodiment is that can not be done and be limited to this with the equipment of login system.
Specifically, in the step S102 in the method for above-mentioned protection user information safety, further includes: system monitoring is to stepping on
When record is abnormal, system also sends registration prompt;It is prompted according to abnormal prompt and registration, sends authorized order to system
Or refusal instruction;System receives authorized order and passes through registration;It logins successfully;It instructs and refuses or, system receives refusal
Registration;Login failure.
The situation of above-mentioned login exception include it is a variety of, system send registration prompt situation be illustrated below:
Citing one
When logging in the abnormal operation for different-place login, for example, the success login system in A, then in the B different from the ground A
Ground login system, system is to A and the login user on the ground B sends login prompt simultaneously, is sent in the login prompt on the ground A and includes
Registration prompt, A user can be prompted according to registration in information voluntarily judge, to system send authorized order,
Then the login user on the ground B logins successfully, or sends refusal instruction to system, then the ground B login user login failure.
Citing two
When abnormal login situation is to carry out register on the logging device different from initial log equipment, for example,
It successfully logs in the first equipment, is then logged in the second equipment for being different from the first equipment, system is to the first equipment and second
The login user of equipment sends login prompt simultaneously, and being sent in the login prompt of the first equipment includes that registration prompts, the
The user of one equipment can be prompted according to registration in information voluntarily judge, to system send authorized order, then second set
Standby upper login user logins successfully, or sends refusal instruction to system, then the login user login failure in the second equipment.
It is successfully logged in when in the first equipment and the second equipment, when then third equipment logs in again, the first equipment of system, second
The user of equipment and third equipment sends login prompt, and being sent to includes logging in the login prompt of the first equipment and the second equipment
Application prompt, the user of the first equipment or the second equipment can be prompted according to registration in information voluntarily judge, to system
Authorized order is sent, then the login user in third equipment logins successfully, or sends refusal instruction to system, then in third equipment
Login user login failure.
Wherein, systemic presupposition success logging device quantity N, when the equipment in the logging device quantity for being more than, i.e., in N+1
When logging in a equipment, system sends login prompt to N number of equipment that first success logs in, and directly refuses the N+1 equipment
Login, make the login failure in the N+1 equipment.
It should be noted that the example above is only two kinds of situations in all login exceptions, other log in unusual condition system
System is performed corresponding processing according to same principle, does not just do illustrate one by one herein.
Specifically, it logs in abnormal further include: login failure.The account of user is with the presence of login failure operating instruction account
There are security risk, system detection to login failure situation is the use logged in first success for the possibility of leakage, i.e. user information
Family sends abnormal prompt, is conducive to the safety for improving user information.
Specifically, the method for above-mentioned protection user information safety further include: when system sets a login to login time
It is long;When continuing no operant activity in log duration after system monitoring is logined successfully to user and exceeding log duration,
This time logging in for user is subjected to crash handling.User's success login system is for a long time without operation, and there are certain safety
Hidden danger, system set a log duration to login time, and user does not have any operation then to exist within the period of log duration
It is automatically to log in this to carry out ageing treatment more than log duration, user, which needs to re-start register and just can enter, is
System, can be improved the safety of user information in this way.
Specifically, security maintenance instruction step S106, is sent to system, system receives security maintenance instruction and believes user
The specific steps that breath carries out security maintenance processing include: to send account freezing application to system, and system receives account freezing application
And account freezes application after by account freezing, by whole security information before account freezing application sending time
The equal kick out of information in library.By the information kick out in whole security information libraries in the login process of user, then exist
The register that information in whole security information libraries is forced to carry out after nullifying is new register, and login process enters
In the process of the method for above-mentioned protection user information safety, convenient for the detection of the safety to login user, is conducive to improve and use
The safety of family information.
Obviously, those skilled in the art can carry out various modification and variations without departing from this hair to the embodiment of the present invention
Bright spirit and scope.In this way, if these modifications and changes of the present invention belongs to the claims in the present invention and its equivalent technologies
Within the scope of, then the present invention is also intended to include these modifications and variations.
Claims (10)
1. a kind of method for protecting user information safety, which is characterized in that comprising steps of
S101, login system, the system generate a security information library to the secure log condition information of login user;
S102, situation progress real-time monitoring is logged in user, and judge that the login condition information detected and the safety are believed
Whether the information of breath library record conflicts, if clashing, judges to log in exception, then the system sends abnormal prompt to user,
Into S103;Exception if not logged in and user's selection carry out logging in track inquiry, into S104;
S103, chosen whether log in track inquiry according to the abnormal prompt: selection carries out logging in track inquiry, enters
S104;Or, selection is ended processing without logging in track inquiry;
S104, send inquiry instruction to system, the system receive the inquiry instruction and to user it is whole log in tracks into
Row query processing, and formed and log in track query result;
S105, judged according to the query result and choose whether to carry out security maintenance: selection carries out security maintenance, enters
S106;Or, selection is ended processing without security maintenance;
S106, Xiang Suoshu system send security maintenance instruction, and the system receives security maintenance instruction and believes the user of user
Breath carries out security maintenance processing.
2. the method for protection user information safety according to claim 1, which is characterized in that include in the abnormal prompt
It logs in exception information and whether carries out the inquiry message of login track inquiry.
3. the method for protection user information safety according to claim 1, which is characterized in that pacify in the security information library
The full element for logging in condition information includes: the identity of login user, login time, logs in place and logging device.
4. the method for protection user information safety according to claim 3, which is characterized in that the login is abnormal to include:
It carries out frequently logging on operation;And/or
Carry out different-place login operation;And/or
Register is carried out on the logging device different from initial log equipment.
5. the method for protection user information safety according to claim 4, which is characterized in that the login place includes net
Segment identification.
6. the method for protection user information safety according to claim 4, which is characterized in that the logging device includes:
Mobile terminal, desktop computer.
7. the method for protection user information safety according to claim 4, which is characterized in that in step s 102, also wrap
It includes:
For the system monitoring to when logging in abnormal, the system also sends registration prompt;
It is prompted according to the abnormal prompt and registration, Xiang Suoshu system sends authorized order or refusal instruction;
The system receives the authorized order and passes through registration;
It logins successfully;
It instructs or, the system receives the refusal and refuses registration;
Login failure.
8. the method for protection user information safety according to claim 3, which is characterized in that the login is also wrapped extremely
It includes: login failure.
9. the method for protection user information safety according to claim 3, which is characterized in that further include:
The system sets a log duration to login time;
Continue no operant activity in the log duration after system monitoring to user logins successfully and beyond institute
When stating log duration, this time logging in for user is subjected to crash handling.
10. the method for protection user information safety according to claim 1, which is characterized in that step S106, sent out to system
Security maintenance is sent to instruct, the system receives security maintenance instruction and carries out the specific steps of security maintenance processing to user information
Include:
Account freezing application is sent to the system, the system receives the account freezing application and the account is freezed to apply
By later by the account freezing, by the whole security information library before the account freezing application sending time
In the equal kick out of information.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711449093.6A CN109981528A (en) | 2017-12-27 | 2017-12-27 | A method of protection user information safety |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711449093.6A CN109981528A (en) | 2017-12-27 | 2017-12-27 | A method of protection user information safety |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109981528A true CN109981528A (en) | 2019-07-05 |
Family
ID=67071803
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711449093.6A Pending CN109981528A (en) | 2017-12-27 | 2017-12-27 | A method of protection user information safety |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109981528A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113760938A (en) * | 2020-06-05 | 2021-12-07 | 金瓜子科技发展(北京)有限公司 | Method and device for monitoring diagnostic instrument and electronic equipment |
CN115987495A (en) * | 2022-12-05 | 2023-04-18 | 南凌科技股份有限公司 | Universal MQTT client id conflict detection and protection implementation system |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080098473A1 (en) * | 2005-11-30 | 2008-04-24 | Huawei Technologies Co., Ltd. | Method, device and security control system for controlling communication border security |
CN103763327A (en) * | 2014-01-28 | 2014-04-30 | 宇龙计算机通信科技(深圳)有限公司 | Account number logging-in method and system |
CN104980400A (en) * | 2014-04-08 | 2015-10-14 | 深圳市腾讯计算机***有限公司 | Login access control method and login access control server |
CN105306210A (en) * | 2014-08-01 | 2016-02-03 | 腾讯科技(深圳)有限公司 | Method, device and system for realizing authorization through application |
-
2017
- 2017-12-27 CN CN201711449093.6A patent/CN109981528A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080098473A1 (en) * | 2005-11-30 | 2008-04-24 | Huawei Technologies Co., Ltd. | Method, device and security control system for controlling communication border security |
CN103763327A (en) * | 2014-01-28 | 2014-04-30 | 宇龙计算机通信科技(深圳)有限公司 | Account number logging-in method and system |
CN104980400A (en) * | 2014-04-08 | 2015-10-14 | 深圳市腾讯计算机***有限公司 | Login access control method and login access control server |
CN105306210A (en) * | 2014-08-01 | 2016-02-03 | 腾讯科技(深圳)有限公司 | Method, device and system for realizing authorization through application |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113760938A (en) * | 2020-06-05 | 2021-12-07 | 金瓜子科技发展(北京)有限公司 | Method and device for monitoring diagnostic instrument and electronic equipment |
CN113760938B (en) * | 2020-06-05 | 2024-05-03 | 金瓜子科技发展(北京)有限公司 | Diagnostic instrument monitoring method and device and electronic equipment |
CN115987495A (en) * | 2022-12-05 | 2023-04-18 | 南凌科技股份有限公司 | Universal MQTT client id conflict detection and protection implementation system |
CN115987495B (en) * | 2022-12-05 | 2023-09-15 | 南凌科技股份有限公司 | Universal MQTT client id conflict detection and protection implementation system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104519032B (en) | A kind of security strategy and system of internet account number | |
US9462009B1 (en) | Detecting risky domains | |
CN104301302B (en) | Go beyond one's commission attack detection method and device | |
CN104852886B (en) | The guard method of user account number and device | |
Wang et al. | Security analysis of SITAR intrusion tolerance system | |
US9667613B1 (en) | Detecting mobile device emulation | |
US8204928B2 (en) | System and method for analyzing internet usage | |
KR101428350B1 (en) | Biometric sensor for human presence detection and associated methods | |
CN107211016A (en) | Secure session is divided and application program parser | |
CN107465642B (en) | Method and device for judging abnormal login of account | |
JP4979812B2 (en) | Security system and security method using one-time execution code | |
CN105704120B (en) | A method of the secure access network based on self study form | |
CN104363240A (en) | Unknown threat comprehensive detection method based on information flow behavior validity detection | |
JP6356749B2 (en) | Unauthorized access detection and processing system, apparatus, method, and computer-readable recording medium | |
CN109753772A (en) | A kind of account safety verification method and system | |
US10560364B1 (en) | Detecting network anomalies using node scoring | |
CN109447651A (en) | Business air control detection method, system, server and storage medium | |
CN109784031A (en) | A kind of account authentication process method and device | |
CN102833247A (en) | Method for anti-sweeping ciphers in user login system and device thereof | |
CN109981528A (en) | A method of protection user information safety | |
CN105516211A (en) | Method, device and system for recognizing database accessing behaviors based on behavior model | |
CN109948333A (en) | A kind of safety defense method and device of account attack | |
Alfarisi et al. | Risk assessment in fleet management system using OCTAVE allegro | |
CN101854357B (en) | Method and system for monitoring network authentication | |
CN109446789A (en) | Anticollision library method, equipment, storage medium and device based on artificial intelligence |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190705 |
|
RJ01 | Rejection of invention patent application after publication |