WO2018219007A1 - User login method, electronic device and storage medium in data query system - Google Patents
User login method, electronic device and storage medium in data query system Download PDFInfo
- Publication number
- WO2018219007A1 WO2018219007A1 PCT/CN2018/078631 CN2018078631W WO2018219007A1 WO 2018219007 A1 WO2018219007 A1 WO 2018219007A1 CN 2018078631 W CN2018078631 W CN 2018078631W WO 2018219007 A1 WO2018219007 A1 WO 2018219007A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- terminal
- login
- user
- data query
- query system
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0815—Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0853—Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/105—Multiple levels of security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/18—Network architectures or network communication protocols for network security using different networks or channels, e.g. using out of band channels
Definitions
- the present invention relates to the field of communications, and in particular, to a user login method, an electronic device, and a storage medium in a data query system.
- the data query system is a commonly used system in the current application management system.
- the data query function may have different permissions for different users in the data query system, thereby providing different services for different users.
- the existing data query system cannot remind the user to log in, and the user experience is poor.
- One of the objectives of the present invention is to provide a user login method, an electronic device, and a storage medium in a data query system, which mainly solve the shortcomings of the existing user experience.
- the first aspect provides a user login method in a data query system, where the method includes the following steps:
- the data query system receives a login request of the user, where the login request includes: a user login ID, a password, and a terminal ID;
- the data query system queries the historical terminal ID of the user login ID
- the prompt information is sent to the historical terminal, and after receiving the confirmation message returned by the historical terminal, the data query system allows the user to log in.
- the prompt information is: a short message or an instant messaging software message.
- the method further includes:
- the data query system counts the number of logins of the terminal ID in the set time. If the number of logins exceeds the set threshold, the terminal ID is replaced with the historical terminal ID.
- the login request further includes: any one or any combination of fingerprint information, palm print information, and facial photos.
- the method further includes:
- the data query system counts the registration frequency of the terminal ID in the set time. If the login frequency exceeds the frequency threshold, the terminal ID is replaced with the historical terminal ID.
- the method includes:
- the data query system reads the second RF identifier corresponding to the second RF communication protocol of the access card through the card reader of the second RF communication protocol, the access card includes: a first RF communication protocol and a second RF communication protocol, the first The RF communication protocol is incompatible with the second RF communication protocol, and the data query system acquires the second login ID corresponding to the second RF identifier according to the mapping relationship between the pre-configured second RF identifier and the login ID, such as the second login ID and the user ID. The same is determined as a normal login, and the user ID is assigned a high authority.
- the data query system If the data query system cannot read the second RF identifier by the card reader of the second RF communication protocol or the read second login ID is different from the user ID, and the login abnormality is determined, the data query system allocates a hidden identifier for the user ID. Permissions and execute the hidden alarm process.
- a data query system comprising:
- a transceiver unit configured to receive a login request of the user, where the login request includes: a user login ID, a password, and a terminal ID;
- the processing unit is configured to query the historical terminal ID of the user login ID; if the terminal ID is different from the historical terminal ID, send the prompt information to the historical terminal, and after receiving the confirmation message returned by the historical terminal, allow the user to log in.
- the prompt information is: a short message or an instant messaging software message.
- the processing unit is further configured to count the number of logins of the terminal ID in the set time, and if the number of logins exceeds the set threshold, replace the terminal ID with the historical terminal ID.
- the system further includes: an RF reading unit, the RF reading unit supports a second RF communication protocol;
- the RF reading unit is configured to read a second RF identifier corresponding to a second RF communication protocol of the access card, where the access card comprises: a first RF communication protocol and a second RF communication protocol, the first RF communication The protocol is not compatible with the second RF communication protocol;
- the processing unit is configured to acquire a second login ID corresponding to the second RF identifier according to a mapping relationship between the second RF identifier and the login ID, where the second login ID is the same as the user ID, and is determined to be normal. Login, assigning high privileges to the user ID.
- the processing unit is further configured to: the card reader that is unable to read the second RF identifier by the second RF communication protocol or the second login ID that is read is different from the user ID, and determine that the login abnormality is performed, and the data query system is Assign hidden permissions to the user ID and perform a hidden alert process.
- an electronic device comprising a processor, the processor for implementing a user login method in the data query system when executing a computer program stored in a memory.
- a fourth aspect provides a computer readable storage medium having stored thereon a computer program that, when executed by a processor, implements a user login method in the data query system.
- the data query system After adopting the user login method and system in the data query system, the data query system can extract the user login ID and the terminal ID in the login request, and the data query system queries the history of the user login ID. The terminal ID compares the historical terminal ID with the terminal ID. If the comparison is inconsistent, the prompt information is sent to the history terminal, and after receiving the confirmation message, the user is allowed to log in.
- the data query system of the public security department since the stored data has certain confidentiality or privacy, the registration of the data query system of the public security department requires strict control, that is, under the premise of ensuring its security.
- the verification of the user login ID is implemented by recording the historical terminal ID of the user login ID, because for the user login ID, the terminal that is logged in in the public security department is relatively fixed, so the history The terminal ID is relatively fixed. If the user replaces the terminal login, because the history terminal is secure, when the new terminal performs the login of the user login ID, it sends a prompt message to the secure history terminal to verify whether the new terminal is secure. The verification succeeds in allowing new terminal logins to improve security.
- the historical terminal belongs to the terminal device commonly used by the user, the user is more convenient to use, so the user can send the confirmation message at any time, and the user's use is not affected. Therefore, the technical solution provided by the present invention can affect the user's use, Users make reminders to improve the security of the data query system and enhance the user experience.
- FIG. 1 is a schematic flowchart of a user login method in a data query system according to a preferred embodiment of the present invention.
- FIG. 2 is a schematic flowchart of a user login method in a data query system according to still another preferred embodiment of the present invention.
- FIG. 3 is a schematic structural diagram of a data query system according to another preferred embodiment of the present invention.
- FIG. 4 is a structural diagram of an electronic device according to the present invention.
- terminal refers to an intelligent electronic device that can perform predetermined processing procedures such as numerical calculations and/or logical calculations by running predetermined programs or instructions, which may include a processor and The memory is executed by the processor to execute a predetermined process pre-stored in the memory to execute a predetermined process, or is executed by hardware such as an ASIC, an FPGA, a DSP, or the like, or a combination of the two.
- Terminals include, but are not limited to, tablets, smart phones, personal digital assistants, e-books, and the like.
- a user login method of a data query system is provided.
- the method is implemented by a data query system, which may be: a computer device, a server, a mobile phone terminal, etc., the data query system. It can be applied to the public security department.
- the data query system is set up in the Shenzhen Public Security Bureau.
- the query authority corresponding to each login ID may also be Different data, and the data that can be queried generally have confidential requirements, such as the location information of the person, the video of the vehicle, etc., and have certain confidentiality requirements for the data, so what method is used for the data query system to restrict the login It is very important to provide a user login method for the data query system in order to restrict the login of the data query system without affecting the normal login.
- the method is as shown in FIG. 1 and includes the following steps:
- Step S101 The data query system receives a login request of the user, where the login request includes: a user login ID, a password, and a terminal ID.
- the login request in the above step S101 may have different representations according to different platforms.
- an internal system it can be an internal login message (eg, an Office Automation (OA) message).
- OA Office Automation
- an external system it may be a login message of a communication protocol (for example, a HyperText Transfer Protocol (HTTP) request).
- HTTP HyperText Transfer Protocol
- the specific communication protocol is not limited in the specific embodiment of the present invention.
- the terminal ID may be a number of the login terminal, a MAC address of the login terminal, or another identifier capable of identifying the login terminal.
- Step S102 The data query system queries the historical terminal ID of the user login ID.
- the history terminal in the above step S102 is the terminal ID used when the user login ID is successfully registered before step S101.
- the historical terminal may be a terminal ID used when the user login ID is successfully registered N times.
- the historical terminal can be queried in the database of the data query system.
- a database of the user login ID can be set in the database of the data query system, and the historical terminal ID used after the login ID of the user is successfully logged is recorded in the list.
- the database queries the user login ID list corresponding to the user login ID, and extracts the historical terminal ID in the list.
- Step S103 If the terminal ID is different from the historical terminal ID, send the prompt information to the historical terminal, and after receiving the confirmation message returned by the historical terminal, the data query system allows the user to log in.
- the data query system directly allows the user to log in.
- the prompt information in the above step S103 may be a short message, and of course, in actual applications, other types of messages, such as instant messaging messages, including but not limited to: WeChat messages, QQ messages, Facebook messages, nailed messages, and more.
- the foregoing manner of sending the prompt information to the historical terminal may be:
- the data query system it is very likely that it is an internal data query system, that is, the data query system is not connected to the Internet or the mobile communication network.
- a closed data query system in addition to sending a prompt to the history terminal.
- Information in addition to receiving confirmation messages for verification, it is also necessary to increase its security, because for closed data query systems, the security requirements of the data are generally high, so you should set a higher security for the closed data query system.
- Level in order to improve the security level, here combined with the employee's access card to comprehensive verification. This application improves the security by identifying the employee's access control card by radio frequency (English: Radio Frequency, RF). Specifically, two kinds of RF communication protocols are set for the employee's access card.
- the first RF communication protocol and the second RF communication protocol are named here, and the first RF communication protocol is incompatible with the second RF communication protocol.
- An RF communication protocol corresponds to the first RF identifier, and the first communication protocol and the first RF identifier are not displayed.
- the first RF identifier can be used to implement an ordinary access control office area, etc., and the second RF communication protocol is hidden. This will increase the difficulty of cracking.
- the data query system reads the second RF identifier corresponding to the second RF communication protocol of the access card through the card reader of the second RF communication protocol, and obtains the second RF identifier according to the mapping relationship between the second RF identifier and the login ID.
- the second login ID if the second login ID is the same as the user ID, is determined to be a normal login, and the user ID is assigned a high authority. If the data query system cannot read the second RF identifier by the card reader of the second RF communication protocol or the read second login ID is different from the user ID, and the login abnormality is determined, the data query system allocates a hidden identifier for the user ID. Permissions and execute the hidden alarm process.
- the above-mentioned hidden authority that is, the right allocated by the data query system for the user ID can only query some specific data, and the specific data is generally non-confidential data, so that the user mistakenly believes that the login has been successfully performed, so that the subsequent alarm process is processed. Staff strive to deal with time.
- the above-mentioned hidden alarm process may be an alarm process that is not detected by the user login. The specific expression of the alarm process is not limited.
- the technical solution provided by the present invention directly acquires the terminal ID when the user logs in, compares the terminal ID with the historical terminal ID, implements matching identification of the login terminal, and sends a prompt message to the login terminal to remind the user to improve the user experience. .
- FIG. 2 provides a user login method in a data query system.
- the method is implemented by a data query system.
- the data query system may be: a computer device, a server, a mobile phone terminal, and the like.
- the method is as shown in FIG. 2 . Including the following steps:
- Step S201 The data query system receives a login request of the user, where the login request includes: a user login ID, a password, and a terminal ID.
- the login request in the above step S201 can be represented by different representations according to different platforms.
- it can pass an internal login message.
- it may be a login message of a communication protocol, and the specific communication protocol is not limited in the specific embodiment of the present invention.
- the terminal ID may be a number of the login terminal, a MAC address of the login terminal, or another identifier capable of identifying the login terminal.
- Step S202 The data query system queries the historical terminal ID of the user login ID.
- the history terminal in the above step S202 is the terminal ID used when the user login ID is successfully registered before step S201.
- the historical terminal may be a terminal ID used when the user login ID is successfully registered N times.
- Step S203 If the terminal ID is different from the historical terminal ID, send the prompt information to the historical terminal, and after receiving the confirmation message returned by the historical terminal, the data query system allows the user to log in.
- the prompt information in the above step S203 may be a short message, of course, in actual applications, other types of messages, such as instant messaging messages, including but not limited to: WeChat messages, QQ messages, Facebook messages, and nail messages. and many more.
- Step S204 The data query system counts the number of logins of the terminal ID in the set time. If the number of logins exceeds the set threshold, the terminal ID is replaced with the historical terminal ID.
- the number of logins may be the number of successful logins.
- the number of logins can be effectively recorded only after the login is successful.
- Other embodiments or other steps of the application, if not specified, the number of logins can be understood as the number of successful logins.
- the technical solution provided by the present invention directly acquires the terminal ID when the user logs in, compares the terminal ID with the historical terminal ID, implements matching identification of the login terminal, and sends a prompt message to the login terminal to remind the user to improve the user experience. .
- the foregoing login request may further include: any one or any combination of fingerprint information, palm print information, and facial photo.
- step S204 may also be replaced by any one of the following steps S204-1, S204-2 or S204-3.
- Step S204-1 The data query system counts the registration frequency of the terminal ID in the set time. If the login frequency exceeds the frequency threshold, the terminal ID is replaced with the historical terminal ID.
- the specific statistical method of the above login frequency may be, for example, the set time is 1 day, within 1 day, the terminal ID is successfully registered once, and the counter is incremented by 1. If the login succeeds 5 times within 1 day, the login frequency may be 5 Times/day. Replacing the historical terminal ID by the login frequency can speed up the update of the historical terminal ID, because for the public security department, if a user ID successfully logs in many times in the same terminal, it is likely that the police officer corresponding to the user ID has been replaced. If the terminal counts by the number of logins, the threshold is generally set for security. Therefore, the time required for statistics is long, and the frequency of updating the historical terminal ID is also reduced, which makes the user inconvenient to use. When the historical terminal ID is replaced by the login frequency of the set time, the replacement of the historical terminal ID can be realized within the set time, and the rapid replacement of the historical terminal ID is realized.
- Step S204-2 The data query system acquires location information of the login terminal. If the location information is within the set range, the terminal ID is replaced with the historical terminal ID.
- the above location information can be obtained through terminal location.
- the public security department is used to explain the technical effect.
- the public security department especially the speciality of its department makes it difficult for the public security department's office address to enter the office address, that is, if it enters the office address, it can use the office.
- the terminal in the address can basically determine the personnel belonging to the public security department, and directly replace the historical terminal ID, and increase the update frequency of the historical terminal ID.
- Step S204-3 The data query system acquires location information of the login terminal, determines whether the location information is one of the plurality of set location information, and if yes, replaces the terminal ID with the historical terminal ID.
- the above location information can be obtained through terminal location.
- step S204-2 is that instead of setting the range, multiple setting position information is used as a trigger condition for performing historical terminal ID replacement, combined with the actual application scenario of the public security department, for the public security department. Due to the importance and confidentiality of data query by the public security department, the allocation of rights is more important. Therefore, the query of the data query system may need to be set in a specific number of locations. This technical solution can limit the login of the user ID. On a limited number of terminals, avoiding the login of the user ID through other terminals improves security.
- FIG. 3 provides a data query system 30.
- the system includes:
- the transceiver unit 301 is configured to receive a login request of the user, where the login request includes: a user login ID, a password, and a terminal ID;
- the processing unit 302 is configured to query the historical terminal ID of the user login ID; if the terminal ID is different from the historical terminal ID, send the prompt information to the historical terminal, and after receiving the confirmation message returned by the historical terminal, allow the user to log in.
- the prompt information is: a short message or an instant messaging software message.
- the processing unit 302 is further configured to count the number of logins of the terminal ID in the set time, and if the number of logins exceeds the set threshold, replace the terminal ID with the historical terminal ID.
- the login request further includes: any one or any combination of fingerprint information, palm print information, and facial photos.
- the processing unit 302 is further configured to collect a registration frequency of the terminal ID in the set time, and if the login frequency exceeds the frequency threshold, replace the terminal ID with the historical terminal ID.
- the specific statistical method of the above login frequency may be, for example, the set time is 1 day, within 1 day, the terminal ID is successfully registered once, and the counter is incremented by 1. If the login succeeds 5 times within 1 day, the login frequency may be 5 Times/day. Replacing the historical terminal ID by the login frequency can speed up the update of the historical terminal ID, because for the public security department, if a user ID successfully logs in many times in the same terminal, it is likely that the police officer corresponding to the user ID has been replaced. If the terminal counts by the number of logins, the threshold is generally set for security. Therefore, the time required for statistics is long, and the frequency of updating the historical terminal ID is also reduced, which makes the user inconvenient to use. When the historical terminal ID is replaced by the login frequency of the set time, the replacement of the historical terminal ID can be realized within the set time, and the rapid replacement of the historical terminal ID is realized.
- the processing unit 302 is further configured to obtain location information of the login terminal, where the location information is located in the set range, and replace the terminal ID with the historical terminal ID.
- the above location information can be obtained through terminal location.
- the public security department is used to explain the technical effect.
- the public security department especially the speciality of its department makes it difficult for the public security department's office address to enter the office address, that is, if it enters the office address, it can use the office.
- the terminal in the address can basically determine the personnel belonging to the public security department, and directly replace the historical terminal ID, and increase the update frequency of the historical terminal ID.
- the processing unit 302 is further configured to acquire location information of the login terminal, determine whether the location information is one of the plurality of set location information, and if yes, replace the terminal ID with the historical terminal ID.
- the above location information can be obtained through terminal location.
- terminal location is not a set range, but a plurality of set position information for triggering whether to change the historical terminal ID, combined with the actual application scenario of the public security department, for the public security department, due to the importance of data query by the public security department and Confidentiality, the allocation of rights is more important, so the query of the data query system may need to be set in a specific number of positions.
- This technical solution can limit the login of the user ID to a limited number of terminals, avoiding the passage. Other terminals log in to the user ID, which improves security.
- the foregoing system further includes: an RF reading unit 303, and the RF reading unit 303 supports the second RF communication protocol;
- the RF reading unit 303 is configured to read a second RF identifier corresponding to the second RF communication protocol of the access card, where the access card comprises: a first RF communication protocol and a second RF communication protocol, the first RF communication protocol Not compatible with the second RF communication protocol;
- the processing unit 302 is further configured to acquire, according to the mapping relationship between the pre-configured second RF identifier and the login ID, the second login ID corresponding to the second RF identifier, where the second login ID is the same as the user ID, and is determined to be normal. Login, assigning high privileges to the user ID.
- the processing unit 302 is further configured to: the second RF identifier cannot be read by the card reader of the second RF communication protocol, or the read second login ID is different from the user ID, and the login abnormality is determined, and the data is determined.
- the query system assigns hidden rights to the user ID and performs a hidden alarm process.
- an embodiment of the present invention further provides an electronic device 40, including but not limited to: a computer device or a server.
- the electronic device 40 includes: a processor 401, a memory 402, and a transceiver. 403 and bus 405.
- the transceiver 403 is configured to transmit and receive data with and from an external device.
- the number of processors 401 in the electronic device 40 may be one or more.
- the electronic device 40 may further include an RF card reader (such as 4 not shown).
- the processor 401, the memory 402, the RF card reader, and the transceiver 403 may be connected to the meanings and examples of the terms involved in the embodiment by using a bus system or other manners. Referring to FIG. 1 or FIG. 2 Corresponding instructions. I will not repeat them here.
- the processor 401 herein may be a processing component or a collective name of multiple processing components.
- the processing element can be a central processing unit, a specific integrated circuit, or one or more integrated circuits configured to implement the embodiments of the present application, such as one or more microprocessors, or one or Multiple field programmable gate arrays.
- the program code is stored in the memory 402.
- the memory 402 may be a storage device or a collective name of a plurality of storage elements, and is used to store executable program code or parameters, data, and the like required for the application running device to operate.
- the memory 402 may include random access memory (RAM), and may also include non-volatile memory such as a magnetic disk memory, a flash memory, or the like.
- the bus 405 can be an industry standard architecture bus, an external device interconnect bus, or an extended industry standard architecture bus.
- the bus can be divided into an address bus, a data bus, a control bus, and the like.
- the electronic device 40 can also include input and output devices coupled to the bus 405 for connection to other portions, such as the processor 401, via a bus.
- the input/output device can provide an input interface for the operator, so that the operator can select the control item through the input interface, and can also be other interfaces through which other devices can be externally connected.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Power Engineering (AREA)
- Information Transfer Between Computers (AREA)
Abstract
Description
Claims (11)
- 一种数据查询***中用户登录方法,其特征在于,所述方法包括如下步骤:A user login method in a data query system, characterized in that the method comprises the following steps:数据查询***接收用户的登录请求,该登录请求包括:用户登录ID、密码以及终端ID;The data query system receives a login request of the user, where the login request includes: a user login ID, a password, and a terminal ID;数据查询***查询该用户登录ID的历史终端ID;The data query system queries the historical terminal ID of the user login ID;如该终端ID与历史终端ID不相同,则向该历史终端发送提示信息,接收历史终端返回的确认消息后,数据查询***允许用户登录。If the terminal ID is different from the historical terminal ID, the prompt information is sent to the historical terminal, and after receiving the confirmation message returned by the historical terminal, the data query system allows the user to log in.
- 根据权利要求1所述的方法,其特征在于,The method of claim 1 wherein所述提示信息为:短消息或即时通信软件消息。The prompt information is: a short message or an instant messaging software message.
- 根据权利要求1所述的方法,其特征在于,所述方法还包括:The method of claim 1 further comprising:数据查询***统计设定时间内终端ID的登录次数,如该登录次数超过设定阈值,则用终端ID替换历史终端ID。The data query system counts the number of logins of the terminal ID in the set time. If the number of logins exceeds the set threshold, the historical terminal ID is replaced with the terminal ID.
- 根据权利要求1所述的方法,其特征在于,所述登录请求中还包括:指纹信息、掌纹信息、面部照片中的任意一种或任意组合。The method according to claim 1, wherein the login request further comprises: any one or any combination of fingerprint information, palm print information, and facial photos.
- 根据权利要求1所述的方法,其特征在于,所述方法还包括:The method of claim 1 further comprising:数据查询***通过第二RF通信协议的读卡器读取门禁卡的第二RF通信协议对应的第二RF标识,所述门禁卡包括:第一RF通信协议和第二RF通信协议,所述第一RF通信协议与第二RF通信协议不兼容;The data query system reads the second RF identifier corresponding to the second RF communication protocol of the access card through the card reader of the second RF communication protocol, where the access card includes: a first RF communication protocol and a second RF communication protocol, The first RF communication protocol is incompatible with the second RF communication protocol;数据查询***依据预配置的第二RF标识与登录ID的映射关系获取所述第二RF标识对应的第二登录ID,如所述第二登录ID与用户ID相同,确定为正常的登录,为所述用户ID分配高权限。The data query system acquires the second login ID corresponding to the second RF identifier according to the mapping relationship between the second RF identifier and the login ID. If the second login ID is the same as the user ID, the data is determined to be a normal login. The user ID is assigned a high authority.
- 一种数据查询***,其特征在于,所述***包括:A data query system, characterized in that the system comprises:收发单元,用于接收用户的登录请求,该登录请求包括:用户登录ID、密码以及终端ID;a transceiver unit, configured to receive a login request of the user, where the login request includes: a user login ID, a password, and a terminal ID;处理单元,用于查询该用户登录ID的历史终端ID;如该终端ID与历史终端ID不相同,则向该历史终端发送提示信息,接收历史终端返回的确认消息后,允许用户登录。The processing unit is configured to query the historical terminal ID of the user login ID; if the terminal ID is different from the historical terminal ID, send the prompt information to the historical terminal, and after receiving the confirmation message returned by the historical terminal, allow the user to log in.
- 根据权利要求6所述的***,其特征在于,The system of claim 6 wherein:所述提示信息为:短消息或即时通信软件消息。The prompt information is: a short message or an instant messaging software message.
- 根据权利要求6所述的***,其特征在于,所述处理单元,还用于统计设定时间内终端ID的登录次数,如该登录次数超过设定阈值,则将终端ID替换历史终端ID。The system according to claim 6, wherein the processing unit is further configured to count the number of logins of the terminal ID in the set time, and if the number of logins exceeds the set threshold, replace the terminal ID with the historical terminal ID.
- 根据权利要求1所述的***,其特征在于,所述***还包括:RF读取单元,所述RF读取单元支持第二RF通信协议;The system of claim 1 wherein said system further comprises: an RF reading unit, said RF reading unit supporting a second RF communication protocol;所述RF读取单元,用于读取门禁卡的第二RF通信协议对应的第二RF标识,所述门禁卡包括:第一RF通信协议和第二RF通信协议,所述第一RF通信协议与第二RF通信协议不兼容;The RF reading unit is configured to read a second RF identifier corresponding to a second RF communication protocol of the access card, where the access card comprises: a first RF communication protocol and a second RF communication protocol, the first RF communication The protocol is not compatible with the second RF communication protocol;所述处理单元,用于依据预配置的第二RF标识与登录ID的映射关系获取所述第二RF标识对应的第二登录ID,如所述第二登录ID与用户ID相同,确定为正常的登录,为所述用户ID分配高权限。The processing unit is configured to acquire a second login ID corresponding to the second RF identifier according to a mapping relationship between the second RF identifier and the login ID, where the second login ID is the same as the user ID, and is determined to be normal. Login, assigning high privileges to the user ID.
- 一种电子设备,其特征在于,所述电子设备包括处理器、所述处理器用于执行存储器中存储的计算机程序时实现如权利要求1-5中任意一项所述的数据查询***中用户登录方法。An electronic device, comprising: a processor, wherein the processor is configured to perform a user login in a data query system according to any one of claims 1-5 when executing a computer program stored in a memory method.
- 一种计算机可读存储介质,其上存储有计算机程序,该程序被处理器执行时实现如权利要求1-5任意一项所述的数据查询***中用户登录方法。A computer readable storage medium having stored thereon a computer program, the program being executed by a processor to implement a user login method in a data query system according to any of claims 1-5.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710400092.6 | 2017-05-31 | ||
CN201710400092.6A CN107222481B (en) | 2017-05-31 | 2017-05-31 | The method and apparatus that user logs in data query system |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2018219007A1 true WO2018219007A1 (en) | 2018-12-06 |
Family
ID=59947230
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2018/078631 WO2018219007A1 (en) | 2017-05-31 | 2018-03-09 | User login method, electronic device and storage medium in data query system |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN107222481B (en) |
WO (1) | WO2018219007A1 (en) |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107222481B (en) * | 2017-05-31 | 2018-03-27 | 深圳云天励飞技术有限公司 | The method and apparatus that user logs in data query system |
CN108197480A (en) * | 2017-12-12 | 2018-06-22 | 泰康保险集团股份有限公司 | Access control method, device and computer readable storage medium |
CN109413460B (en) * | 2018-08-30 | 2021-10-08 | 视联动力信息技术股份有限公司 | Method and system for displaying function menu of video network terminal |
CN109088943B (en) * | 2018-09-17 | 2021-09-21 | 视联动力信息技术股份有限公司 | Blood pressure detection method and device |
CN110427747B (en) * | 2019-06-20 | 2021-12-14 | 中国科学院信息工程研究所 | Identity authentication method and device supporting service security mark |
CN114327517B (en) * | 2021-12-29 | 2022-07-29 | 深圳市驱动人生科技股份有限公司 | Software-driven implementation method and system |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104125062A (en) * | 2013-04-26 | 2014-10-29 | 腾讯科技(深圳)有限公司 | Login method, device, login authentication device, server, terminals and system |
WO2014173160A1 (en) * | 2013-04-27 | 2014-10-30 | Tencent Technology (Shenzhen) Company Limited | Method and system for access control |
CN105072079A (en) * | 2015-06-30 | 2015-11-18 | 小米科技有限责任公司 | Account logon method, account logon device and terminal device |
CN105306610A (en) * | 2014-07-04 | 2016-02-03 | 腾讯科技(深圳)有限公司 | Network identifier detection method and device |
CN105847245A (en) * | 2016-03-21 | 2016-08-10 | 杭州朗和科技有限公司 | Electronic mail box login authentication method and device |
CN107222481A (en) * | 2017-05-31 | 2017-09-29 | 深圳云天励飞技术有限公司 | The method and apparatus of User logs in data query system |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR100931326B1 (en) * | 2008-09-09 | 2009-12-11 | 주식회사 로그 | A managing system for id/password search list and login list and the method thereof |
JP5613855B1 (en) * | 2014-04-23 | 2014-10-29 | 株式会社 ディー・エヌ・エー | User authentication system |
CN105656948A (en) * | 2016-03-30 | 2016-06-08 | 北京小米移动软件有限公司 | Account login method and device |
-
2017
- 2017-05-31 CN CN201710400092.6A patent/CN107222481B/en active Active
-
2018
- 2018-03-09 WO PCT/CN2018/078631 patent/WO2018219007A1/en active Application Filing
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104125062A (en) * | 2013-04-26 | 2014-10-29 | 腾讯科技(深圳)有限公司 | Login method, device, login authentication device, server, terminals and system |
WO2014173160A1 (en) * | 2013-04-27 | 2014-10-30 | Tencent Technology (Shenzhen) Company Limited | Method and system for access control |
CN105306610A (en) * | 2014-07-04 | 2016-02-03 | 腾讯科技(深圳)有限公司 | Network identifier detection method and device |
CN105072079A (en) * | 2015-06-30 | 2015-11-18 | 小米科技有限责任公司 | Account logon method, account logon device and terminal device |
CN105847245A (en) * | 2016-03-21 | 2016-08-10 | 杭州朗和科技有限公司 | Electronic mail box login authentication method and device |
CN107222481A (en) * | 2017-05-31 | 2017-09-29 | 深圳云天励飞技术有限公司 | The method and apparatus of User logs in data query system |
Also Published As
Publication number | Publication date |
---|---|
CN107222481A (en) | 2017-09-29 |
CN107222481B (en) | 2018-03-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2018219007A1 (en) | User login method, electronic device and storage medium in data query system | |
US9432358B2 (en) | System and method of authenticating user account login request messages | |
US10681026B2 (en) | Secure shell public key audit system | |
US11874914B2 (en) | Authentication system, and information recording medium | |
CN110086783B (en) | Multi-account management method and device, electronic equipment and storage medium | |
CN108701175B (en) | Associating user accounts with enterprise workspaces | |
WO2018133683A1 (en) | Network authentication method and apparatus | |
US20190199530A1 (en) | Device attestation server and method for attesting to the integrity of a mobile device | |
EP2888855A1 (en) | Systems and methods for lock access management using wireless signals | |
US20130144960A1 (en) | Method and system for announcing death of a user in a communication network | |
WO2020233356A1 (en) | Test environment control method and apparatus, computer-readable storage medium and server | |
US9178874B2 (en) | Method, device and system for logging in through a browser application at a client terminal | |
US20140283125A1 (en) | Facial recognition-based information discovery | |
CN110602216A (en) | Method and device for using single account by multiple terminals, cloud server and storage medium | |
US20170238279A1 (en) | Method for processing notification message in wireless communication system and apparatus therefor | |
EP4242891A2 (en) | Systems and methods for securing login access | |
US11363017B2 (en) | Smart home network security through blockchain | |
CA3024158A1 (en) | Method and apparatus for issuing a credential for an incident area network | |
US10051085B2 (en) | System and method of data and command request processing | |
KR20150133055A (en) | An electronic attendance method with a wireless access point | |
US10044838B2 (en) | Method of automatically setting protocol in programmable logic controller system | |
CN108494749B (en) | Method, device and equipment for disabling IP address and computer readable storage medium | |
US11444950B2 (en) | Automated verification of authenticated users accessing a physical resource | |
US20170279686A1 (en) | Terminal Topology Management Service Method, Device, and System for Internet of Things | |
WO2015117362A1 (en) | Method and device for sharing personal information on terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 18808791 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 18808791 Country of ref document: EP Kind code of ref document: A1 |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 13.03.2020) |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 18808791 Country of ref document: EP Kind code of ref document: A1 |