CN109981528A - A method of protection user information safety - Google Patents

A method of protection user information safety Download PDF

Info

Publication number
CN109981528A
CN109981528A CN201711449093.6A CN201711449093A CN109981528A CN 109981528 A CN109981528 A CN 109981528A CN 201711449093 A CN201711449093 A CN 201711449093A CN 109981528 A CN109981528 A CN 109981528A
Authority
CN
China
Prior art keywords
user
login
log
user information
logging
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711449093.6A
Other languages
Chinese (zh)
Inventor
王轶晨
冯畅
申国林
杨金
杜丽丽
何强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Aisino Corp
Original Assignee
Aisino Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Aisino Corp filed Critical Aisino Corp
Priority to CN201711449093.6A priority Critical patent/CN109981528A/en
Publication of CN109981528A publication Critical patent/CN109981528A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • H04L63/205Network architectures or network communication protocols for network security for managing network security; network security policies in general involving negotiation or determination of the one or more network security mechanisms to be used, e.g. by negotiation between the client and the server or between peers or by selection according to the capabilities of the entities involved

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Debugging And Monitoring (AREA)

Abstract

The present invention relates to technical field of system security, disclose the method for protection user information safety, the method comprising the steps of: login system;Situation is logged in user and carries out real-time monitoring, judges to log in exception, then system sends abnormal prompt to user;It is carried out logging in track inquiry according to abnormal prompt selection;Inquiry instruction is sent to system, system receives inquiry instruction and carries out query processing to whole tracks that log in of user, and is formed and log in track query result;Judge that selection carries out security maintenance according to query result;Security maintenance instruction is sent to system, system receives security maintenance instruction and carries out security maintenance processing to the user information of user.This method makes system have login track query function; and has the function of security maintenance; whole tracks that log in of user can be inquired; when user has found oneself user information, there are when security risk; carry out security maintenance; user information is played and is effectively protected, the safety of user information is improved.

Description

A method of protection user information safety
Technical field
The present invention relates to technical field of system security, in particular to a kind of method for protecting user information safety.
Background technique
With the rapidly development of the development of information technology, especially e-commerce, so that the application of mobile terminal App is increasingly Extensively, when people using all kinds of websites and mobile terminal App when being obtained information, giving out information or carry out consumption activity, just It needs to carry out user information registration, and logs in the service that could use completion with the user of successful registration, so, user information Safety it is particularly significant.
With current situation, all kinds of different websites, mobile terminal App customer relationship do not get through, it is all individually separated Storage and management, in such a case, it is easy to which the situation that user information leakage occurs then is slapped when user information is leaked The people for holding the user information can log in corresponding system, make user's damage of the rights and interests, but in the prior art, Yong Huwu Method grasps the Account Logon track of oneself completely, can not understand the Account Logon situation of oneself, and therefore, user information has peace Full hidden danger.
Summary of the invention
The present invention provides a kind of method for protecting user information safety, the method for the protection user information safety makes system With track query function is logged in, and have the function of security maintenance, whole login tracks of user can be inquired, when with Family finds that the user information of oneself there are when security risk, can carry out security maintenance, play and be effectively protected to user information, Effectively raise the safety of user information.
In order to achieve the above objectives, the present invention the following technical schemes are provided:
A method of protection user information safety, comprising steps of
S101, login system, the system generate a security information library to the secure log condition information of login user;
S102, situation progress real-time monitoring is logged in user, and judge the login condition information detected and the peace Whether the information of full information library record conflicts, if clashing, judges to log in exception, then the system sends abnormal mention to user Show, into S103;Exception if not logged in and user's selection carry out logging in track inquiry, into S104;
S103, chosen whether log in track inquiry according to the abnormal prompt: selection carries out logging in track inquiry, into Enter S104;Or, selection is ended processing without logging in track inquiry;
S104, inquiry instruction is sent to system, the system receives the inquiry instruction and logs in rail to the whole of user Mark carries out query processing, and is formed and log in track query result;
S105, judged according to the query result and choose whether to carry out security maintenance: selection carries out security maintenance, enters S106;Or, selection is ended processing without security maintenance;
S106, Xiang Suoshu system send security maintenance instruction, and the system receives security maintenance instruction and to the use of user Family information carries out security maintenance processing.
In the method for above-mentioned protection user information safety, user uses account login system, and system can be to login user The security information library for generating the secure log situation of record login user is logged in every time, and system carries out the login situation of user real When monitor, as long as that is, user system occur login behavior, system can monitor, and system stepping on each time to user Record situation is detected and whether the information for judging that the login condition information detected is recorded with security information library clashes, if It clashes, is judged as logging in exception, then send abnormal prompt to user to prompt user, user is according in abnormal prompt Hold autonomous judgement to choose whether log in track inquiry, if user's selection carries out logging in track inquiry, user is grasped Make to send inquiry instruction to system, if terminating the processing to track inquiry is logged in without logging in track inquiry;Work as user Selection carry out log in track inquiry, then user operated to system send inquiry instruction when, system receive inquiry instruction into Row inquires whole tracks that log in of user, and forms the login track inquiry knot including the information recorded in security information library Fruit, the whole of account that such user can understand oneself by logging in track log in track, and in turn, user can be according to login Track query result judges oneself user information with the presence or absence of security risk, when user's judgement is there are when security risk, user Can carry out operation row system transmission security maintenance instruction will be to the user of user after system receives security maintenance instruction Information carries out security maintenance processing, ensures the safety of user information, and when user's judgement is there is no when security risk, end is to safety The processing of maintenance, i.e., without security maintenance operation processing;In addition, when system does not monitor to log in unusual condition, user Can also voluntarily activation system login track query function, send inquiry instruction to system, system carries out subsequent login rail Mark query processing, such as above-mentioned query processing process, details are not described herein again, in this way, system, which has, logs in track to the whole of user Query function, family can be used understand the whole of oneself and log in tracks, judge the safety of login user, and can be pacified Full maintenance processing, effectively raises the safety of user information.
In the method for above-mentioned protection user information safety, there is system and log in track query function, and there is safety dimension Protective function can inquire whole tracks that log in of user, and when user has found oneself user information, there are security risks When, security maintenance can be carried out, user information is played and is effectively protected, effectively raises the safety of user information.
It preferably, include the inquiry for logging in exception information and whether carrying out login track inquiry in the abnormal prompt Information.
Preferably, in the security information library element of secure log condition information include: login user identity, Login time logs in place and logging device.
Preferably, the login exception includes:
It carries out frequently logging on operation;And/or
Carry out different-place login operation;And/or
Register is carried out on the logging device different from initial log equipment.
Preferably, the login place includes network segment mark.
Preferably, the logging device includes: mobile terminal and desktop computer.
Preferably, in step s 102, further includes:
For the system monitoring to when logging in abnormal, the system also sends registration prompt;
It is prompted according to the abnormal prompt and registration, Xiang Suoshu system sends authorized order or refusal instruction;
The system receives the authorized order and passes through registration;
It logins successfully;
It instructs or, the system receives the refusal and refuses registration;
Login failure.
Preferably, the login is abnormal further include: login failure.
Preferably, further includes:
The system sets a log duration to login time;
Continue no operant activity in the log duration after system monitoring to user logins successfully and surpasses Out when the log duration, this time logging in for user is subjected to crash handling.
Preferably, step S106, send security maintenance instruction to system, the system receive security maintenance instruction and to Family information carry out security maintenance processing specific steps include:
Account freezing application is sent to the system, the system receives the account freezing application and the account is freezed Application, by the account freezing, the safety of the whole before the account freezing application sending time is believed after Cease the equal kick out of information in library.
Detailed description of the invention
Fig. 1 is the method flow schematic diagram of protection user information safety provided in an embodiment of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other Embodiment shall fall within the protection scope of the present invention.
Referring to FIG. 1, a kind of method for protecting user information safety provided in an embodiment of the present invention, comprising steps of
Step S101, login system, system generate a security information library to the secure log condition information of login user;
Step S102, situation is logged in user and carries out real-time monitoring, and judge the login condition information detected and peace Whether the information of full information library record conflicts, if clashing, judges to log in exception, then system sends abnormal prompt to user, Enter step S103;Exception if not logged in and user's selection carry out logging in track inquiry, enter step S104;
Step S103, chosen whether log in track inquiry according to abnormal prompt: selection carries out logging in track inquiry, into Enter step S104;Or, selection is ended processing without logging in track inquiry;
Step S104, send inquiry instruction to system, system receive inquiry instruction and to user it is whole log in tracks into Row query processing, and formed and log in track query result;
Step S105, judged according to query result and choose whether to carry out security maintenance: selection carries out security maintenance, enters S106;Or, selection is ended processing without security maintenance;
Step S106, security maintenance instruction is sent to system, system receives security maintenance instruction and believes the user of user Breath carries out security maintenance processing.
In the method for above-mentioned protection user information safety, user uses account login system, and system can be to login user The security information library for generating the secure log situation of record login user is logged in every time, and system carries out the login situation of user real When monitor, as long as that is, user system occur login behavior, system can monitor, and system stepping on each time to user Record situation is detected and whether the information for judging that the login condition information detected is recorded with security information library clashes, if It clashes, is judged as logging in exception, then send abnormal prompt to user to prompt user, user is according in abnormal prompt Hold autonomous judgement to choose whether log in track inquiry, if user's selection carries out logging in track inquiry, user is grasped Make to send inquiry instruction to system, if terminating the processing to track inquiry is logged in without logging in track inquiry;Work as user Selection carry out log in track inquiry, then user operated to system send inquiry instruction when, system receive inquiry instruction into Row inquires whole tracks that log in of user, and forms the login track inquiry knot including the information recorded in security information library Fruit, the whole of account that such user can understand oneself by logging in track log in track, and in turn, user can be according to login Track query result judges oneself user information with the presence or absence of security risk, when user's judgement is there are when security risk, user Can carry out operation row system transmission security maintenance instruction will be to the user of user after system receives security maintenance instruction Information carries out security maintenance processing, ensures the safety of user information, and when user's judgement is there is no when security risk, end is to safety The processing of maintenance, i.e., without security maintenance operation processing;In addition, when system does not monitor to log in unusual condition, user Can also voluntarily activation system login track query function, send inquiry instruction to system, system carries out subsequent login rail Mark query processing, such as above-mentioned query processing process, details are not described herein again, in this way, system, which has, logs in track to the whole of user Query function, family can be used understand the whole of oneself and log in tracks, judge the safety of login user, and can be pacified Full maintenance processing, effectively raises the safety of user information.
In the method for above-mentioned protection user information safety, there is system and log in track query function, and there is safety dimension Protective function can inquire whole tracks that log in of user, and when user has found oneself user information, there are security risks When, security maintenance can be carried out, user information is played and is effectively protected, effectively raises the safety of user information.
Specifically, in the method for above-mentioned protection user information safety, in abnormal prompt include log in exception information and whether Log in the inquiry message of track inquiry.Logging in exception information includes the information recorded in security information library, understands user About the information for the register for occurring to log in exception, security risk is judged whether there is convenient for user, when user judges exist When security risk, whether can carry out directly sending inquiry instruction to system in the inquiry message for logging in track inquiry, be convenient for User log in the inquiry operation of track.
Specifically, the element of secure log condition information includes: the identity of login user, logs in security information library Time logs in place and logging device.The identity of login user is login account of the user in system, in order to system pair The status differentiation of login user, login time, i.e., the time point of register and after logining successfully in the log duration of system, Geographical location where when logging in place, i.e. logging in system by user, the login used of when logging device, i.e. logging in system by user are set It is standby, such as mobile phone, computer, or other electronic equipments, more than the element of secure log condition information includes in security information library Element, detailed understandings login situation when user query being allow to log in track, the judgement convenient for user to login situation, favorably It is more effective to the protection of the safety of user information in recognizing whether security risk, improve the safety of user information.
Specifically, logging in abnormal includes: to carry out frequently logging on operation;And/or carry out different-place login operation;And/or Register is carried out on the logging device different from initial log equipment.When user carried out repeatedly logging in behaviour within the regular hour Make, the time interval between adjacent register twice is shorter, and no matter whether register succeeds, and is considered as and frequently logs on behaviour Make;When user account be different from formerly logged in place place log in, be considered as different-place login operation, wherein formerly step on Recording place is the place logined successfully before last time logs in;When the account of user is being different from first logging device Equipment logs in, and is considered as on the logging device different from initial log equipment and carries out register, wherein first logging device is most The equipment logined successfully before primary login afterwards logs in abnormal log in including one of above-mentioned three kinds of register situations and grasps Make the combination of arbitrary two kinds of registers or above-mentioned three kinds of register shapes in situation or above-mentioned three kinds of register situations The combination of whole register situations in condition can make system more fully log in situation to user and detect, and be conducive to pair User information protect, and improves the safety of user information.
Specifically, logging in place includes network segment mark.In many cases, people use Intranet in a certain range, then when User is considered as identical login place when any point of Intranet logs in.
Specifically, logging device includes: mobile terminal, desktop computer.Mobile terminal includes mobile phone, tablet computer, pen Remember this computer etc.;Desktop computer include: desktop computer and it is fixed can login system equipment.It should be noted that Logging device in the present embodiment is that can not be done and be limited to this with the equipment of login system.
Specifically, in the step S102 in the method for above-mentioned protection user information safety, further includes: system monitoring is to stepping on When record is abnormal, system also sends registration prompt;It is prompted according to abnormal prompt and registration, sends authorized order to system Or refusal instruction;System receives authorized order and passes through registration;It logins successfully;It instructs and refuses or, system receives refusal Registration;Login failure.
The situation of above-mentioned login exception include it is a variety of, system send registration prompt situation be illustrated below:
Citing one
When logging in the abnormal operation for different-place login, for example, the success login system in A, then in the B different from the ground A Ground login system, system is to A and the login user on the ground B sends login prompt simultaneously, is sent in the login prompt on the ground A and includes Registration prompt, A user can be prompted according to registration in information voluntarily judge, to system send authorized order, Then the login user on the ground B logins successfully, or sends refusal instruction to system, then the ground B login user login failure.
Citing two
When abnormal login situation is to carry out register on the logging device different from initial log equipment, for example, It successfully logs in the first equipment, is then logged in the second equipment for being different from the first equipment, system is to the first equipment and second The login user of equipment sends login prompt simultaneously, and being sent in the login prompt of the first equipment includes that registration prompts, the The user of one equipment can be prompted according to registration in information voluntarily judge, to system send authorized order, then second set Standby upper login user logins successfully, or sends refusal instruction to system, then the login user login failure in the second equipment.
It is successfully logged in when in the first equipment and the second equipment, when then third equipment logs in again, the first equipment of system, second The user of equipment and third equipment sends login prompt, and being sent to includes logging in the login prompt of the first equipment and the second equipment Application prompt, the user of the first equipment or the second equipment can be prompted according to registration in information voluntarily judge, to system Authorized order is sent, then the login user in third equipment logins successfully, or sends refusal instruction to system, then in third equipment Login user login failure.
Wherein, systemic presupposition success logging device quantity N, when the equipment in the logging device quantity for being more than, i.e., in N+1 When logging in a equipment, system sends login prompt to N number of equipment that first success logs in, and directly refuses the N+1 equipment Login, make the login failure in the N+1 equipment.
It should be noted that the example above is only two kinds of situations in all login exceptions, other log in unusual condition system System is performed corresponding processing according to same principle, does not just do illustrate one by one herein.
Specifically, it logs in abnormal further include: login failure.The account of user is with the presence of login failure operating instruction account There are security risk, system detection to login failure situation is the use logged in first success for the possibility of leakage, i.e. user information Family sends abnormal prompt, is conducive to the safety for improving user information.
Specifically, the method for above-mentioned protection user information safety further include: when system sets a login to login time It is long;When continuing no operant activity in log duration after system monitoring is logined successfully to user and exceeding log duration, This time logging in for user is subjected to crash handling.User's success login system is for a long time without operation, and there are certain safety Hidden danger, system set a log duration to login time, and user does not have any operation then to exist within the period of log duration It is automatically to log in this to carry out ageing treatment more than log duration, user, which needs to re-start register and just can enter, is System, can be improved the safety of user information in this way.
Specifically, security maintenance instruction step S106, is sent to system, system receives security maintenance instruction and believes user The specific steps that breath carries out security maintenance processing include: to send account freezing application to system, and system receives account freezing application And account freezes application after by account freezing, by whole security information before account freezing application sending time The equal kick out of information in library.By the information kick out in whole security information libraries in the login process of user, then exist The register that information in whole security information libraries is forced to carry out after nullifying is new register, and login process enters In the process of the method for above-mentioned protection user information safety, convenient for the detection of the safety to login user, is conducive to improve and use The safety of family information.
Obviously, those skilled in the art can carry out various modification and variations without departing from this hair to the embodiment of the present invention Bright spirit and scope.In this way, if these modifications and changes of the present invention belongs to the claims in the present invention and its equivalent technologies Within the scope of, then the present invention is also intended to include these modifications and variations.

Claims (10)

1. a kind of method for protecting user information safety, which is characterized in that comprising steps of
S101, login system, the system generate a security information library to the secure log condition information of login user;
S102, situation progress real-time monitoring is logged in user, and judge that the login condition information detected and the safety are believed Whether the information of breath library record conflicts, if clashing, judges to log in exception, then the system sends abnormal prompt to user, Into S103;Exception if not logged in and user's selection carry out logging in track inquiry, into S104;
S103, chosen whether log in track inquiry according to the abnormal prompt: selection carries out logging in track inquiry, enters S104;Or, selection is ended processing without logging in track inquiry;
S104, send inquiry instruction to system, the system receive the inquiry instruction and to user it is whole log in tracks into Row query processing, and formed and log in track query result;
S105, judged according to the query result and choose whether to carry out security maintenance: selection carries out security maintenance, enters S106;Or, selection is ended processing without security maintenance;
S106, Xiang Suoshu system send security maintenance instruction, and the system receives security maintenance instruction and believes the user of user Breath carries out security maintenance processing.
2. the method for protection user information safety according to claim 1, which is characterized in that include in the abnormal prompt It logs in exception information and whether carries out the inquiry message of login track inquiry.
3. the method for protection user information safety according to claim 1, which is characterized in that pacify in the security information library The full element for logging in condition information includes: the identity of login user, login time, logs in place and logging device.
4. the method for protection user information safety according to claim 3, which is characterized in that the login is abnormal to include:
It carries out frequently logging on operation;And/or
Carry out different-place login operation;And/or
Register is carried out on the logging device different from initial log equipment.
5. the method for protection user information safety according to claim 4, which is characterized in that the login place includes net Segment identification.
6. the method for protection user information safety according to claim 4, which is characterized in that the logging device includes: Mobile terminal, desktop computer.
7. the method for protection user information safety according to claim 4, which is characterized in that in step s 102, also wrap It includes:
For the system monitoring to when logging in abnormal, the system also sends registration prompt;
It is prompted according to the abnormal prompt and registration, Xiang Suoshu system sends authorized order or refusal instruction;
The system receives the authorized order and passes through registration;
It logins successfully;
It instructs or, the system receives the refusal and refuses registration;
Login failure.
8. the method for protection user information safety according to claim 3, which is characterized in that the login is also wrapped extremely It includes: login failure.
9. the method for protection user information safety according to claim 3, which is characterized in that further include:
The system sets a log duration to login time;
Continue no operant activity in the log duration after system monitoring to user logins successfully and beyond institute When stating log duration, this time logging in for user is subjected to crash handling.
10. the method for protection user information safety according to claim 1, which is characterized in that step S106, sent out to system Security maintenance is sent to instruct, the system receives security maintenance instruction and carries out the specific steps of security maintenance processing to user information Include:
Account freezing application is sent to the system, the system receives the account freezing application and the account is freezed to apply By later by the account freezing, by the whole security information library before the account freezing application sending time In the equal kick out of information.
CN201711449093.6A 2017-12-27 2017-12-27 A method of protection user information safety Pending CN109981528A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711449093.6A CN109981528A (en) 2017-12-27 2017-12-27 A method of protection user information safety

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711449093.6A CN109981528A (en) 2017-12-27 2017-12-27 A method of protection user information safety

Publications (1)

Publication Number Publication Date
CN109981528A true CN109981528A (en) 2019-07-05

Family

ID=67071803

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711449093.6A Pending CN109981528A (en) 2017-12-27 2017-12-27 A method of protection user information safety

Country Status (1)

Country Link
CN (1) CN109981528A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113760938A (en) * 2020-06-05 2021-12-07 金瓜子科技发展(北京)有限公司 Method and device for monitoring diagnostic instrument and electronic equipment
CN115987495A (en) * 2022-12-05 2023-04-18 南凌科技股份有限公司 Universal MQTT client id conflict detection and protection implementation system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080098473A1 (en) * 2005-11-30 2008-04-24 Huawei Technologies Co., Ltd. Method, device and security control system for controlling communication border security
CN103763327A (en) * 2014-01-28 2014-04-30 宇龙计算机通信科技(深圳)有限公司 Account number logging-in method and system
CN104980400A (en) * 2014-04-08 2015-10-14 深圳市腾讯计算机***有限公司 Login access control method and login access control server
CN105306210A (en) * 2014-08-01 2016-02-03 腾讯科技(深圳)有限公司 Method, device and system for realizing authorization through application

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080098473A1 (en) * 2005-11-30 2008-04-24 Huawei Technologies Co., Ltd. Method, device and security control system for controlling communication border security
CN103763327A (en) * 2014-01-28 2014-04-30 宇龙计算机通信科技(深圳)有限公司 Account number logging-in method and system
CN104980400A (en) * 2014-04-08 2015-10-14 深圳市腾讯计算机***有限公司 Login access control method and login access control server
CN105306210A (en) * 2014-08-01 2016-02-03 腾讯科技(深圳)有限公司 Method, device and system for realizing authorization through application

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113760938A (en) * 2020-06-05 2021-12-07 金瓜子科技发展(北京)有限公司 Method and device for monitoring diagnostic instrument and electronic equipment
CN113760938B (en) * 2020-06-05 2024-05-03 金瓜子科技发展(北京)有限公司 Diagnostic instrument monitoring method and device and electronic equipment
CN115987495A (en) * 2022-12-05 2023-04-18 南凌科技股份有限公司 Universal MQTT client id conflict detection and protection implementation system
CN115987495B (en) * 2022-12-05 2023-09-15 南凌科技股份有限公司 Universal MQTT client id conflict detection and protection implementation system

Similar Documents

Publication Publication Date Title
CN104519032B (en) A kind of security strategy and system of internet account number
US9462009B1 (en) Detecting risky domains
CN104301302B (en) Go beyond one's commission attack detection method and device
CN104852886B (en) The guard method of user account number and device
Wang et al. Security analysis of SITAR intrusion tolerance system
US9667613B1 (en) Detecting mobile device emulation
US8204928B2 (en) System and method for analyzing internet usage
KR101428350B1 (en) Biometric sensor for human presence detection and associated methods
CN107211016A (en) Secure session is divided and application program parser
CN107465642B (en) Method and device for judging abnormal login of account
JP4979812B2 (en) Security system and security method using one-time execution code
CN105704120B (en) A method of the secure access network based on self study form
CN104363240A (en) Unknown threat comprehensive detection method based on information flow behavior validity detection
JP6356749B2 (en) Unauthorized access detection and processing system, apparatus, method, and computer-readable recording medium
CN109753772A (en) A kind of account safety verification method and system
US10560364B1 (en) Detecting network anomalies using node scoring
CN109447651A (en) Business air control detection method, system, server and storage medium
CN109784031A (en) A kind of account authentication process method and device
CN102833247A (en) Method for anti-sweeping ciphers in user login system and device thereof
CN109981528A (en) A method of protection user information safety
CN105516211A (en) Method, device and system for recognizing database accessing behaviors based on behavior model
CN109948333A (en) A kind of safety defense method and device of account attack
Alfarisi et al. Risk assessment in fleet management system using OCTAVE allegro
CN101854357B (en) Method and system for monitoring network authentication
CN109446789A (en) Anticollision library method, equipment, storage medium and device based on artificial intelligence

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190705

RJ01 Rejection of invention patent application after publication