CN118316671B - Method for protecting client side by double factors - Google Patents
Method for protecting client side by double factors Download PDFInfo
- Publication number
- CN118316671B CN118316671B CN202410407814.0A CN202410407814A CN118316671B CN 118316671 B CN118316671 B CN 118316671B CN 202410407814 A CN202410407814 A CN 202410407814A CN 118316671 B CN118316671 B CN 118316671B
- Authority
- CN
- China
- Prior art keywords
- node
- disguised
- sequence
- access
- nodes
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 41
- 238000012795 verification Methods 0.000 claims abstract description 91
- 230000000875 corresponding effect Effects 0.000 claims description 22
- 230000002596 correlated effect Effects 0.000 claims description 3
- 238000012544 monitoring process Methods 0.000 abstract description 3
- 238000010586 diagram Methods 0.000 description 8
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000006467 substitution reaction Methods 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 230000001010 compromised effect Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/101—Access control lists [ACL]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/105—Multiple levels of security
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention relates to the field of client protection, in particular to a method for performing double-factor protection on a client, which comprises the steps of configuring unique serial number labels for disguised nodes and constructing association relations by arranging a plurality of disguised nodes, arranging a supervision server connected with each disguised node to supervise each disguised node, arranging real nodes in the disguised nodes, continuously switching serial numbers of the real nodes, the access sequence is changed in the disguised node, the access sequence is brought into verification, the monitoring server monitors, after the real node is found, the sending end and the receiving end of the double-factor verification information adopt different forms, further, the multi-dimension protection is carried out on the double-factor verification process, the risk of breaking through verification after the verification information is stolen is reduced, and the safety of the access end for accessing the client is improved.
Description
Technical Field
The invention relates to the field of client protection, in particular to a method for protecting a client by double factors.
Background
Two-factor authentication (Two-Factor Authentication,2 FA) is an enhanced security measure that requires a user to provide Two different types of authentication factors during login, which can be achieved through a gateway of an internal network, and also through an authentication service performed by a server node of a cloud service provider, and the purpose of this method is to provide an additional security layer to ensure that even if one factor (such as a password) is compromised, there is security redundancy, and that there is still some security of an account.
For example, CN110022559a discloses a network user authentication method, which includes performing a first authentication operation on an id and a password by a terminal, transmitting login authentication request information to a first sensor node, generating a first key material by the first sensor node, transmitting the first key material and the login authentication request information to a gateway node, performing a second authentication operation on the first sensor node by the gateway node, performing a third authentication operation on the login authentication request information by the gateway node, generating a second key material by the gateway node, transmitting the second key material to the second sensor node, performing a fourth authentication operation on the gateway node by the second sensor node, generating a third key material by the second sensor node, transmitting the third key material to a user, performing a fifth authentication operation on the gateway node, and calculating a session key according to a fifth operation result. The network user authentication method of the application adopts a double-factor user authentication method, so that the security of a user account is greatly improved.
There are problems in the prior art that,
In the prior art, a gateway node is generally adopted to perform dual-factor verification on an access terminal, but if the verification gateway is attacked or a stealer steals verification information returned by the access terminal to perform verification when a single gateway is adopted, a certain security problem may exist, and the security coefficient is not high.
Disclosure of Invention
Therefore, the invention provides a method for performing double-factor protection on a client, which is used for overcoming the problems that in the prior art, a gateway node is generally adopted to perform double-factor verification on an access terminal, but if a single gateway is adopted to perform verification, if the verification gateway is attacked or a stealer steals verification information returned by the access terminal to perform verification, a certain safety problem can exist, and the safety coefficient is not high.
To achieve the above object, the present invention provides a method for two-factor protection for a client, including:
Step S1, calling a plurality of disguised nodes, configuring unique serial number labels for the disguised nodes, and setting association relations among the disguised nodes, wherein the calling quantity of the disguised nodes is determined based on the accessed times of a client in a preset time;
Step S2, a supervision server connected with each disguised node is set, a storage set is arranged in the supervision server to store real node serial numbers switched by a preset rule, wherein the supervision server can acquire access records of each disguised node and control data output of the disguised node,
Step S3, the supervision server verifies the identity information of the access terminal after receiving the access request of the access terminal, calls the real node serial numbers stored in the current stage of the storage set, and synchronously generates serial number sequences to feed back to the access terminal;
Step S4, the access terminal accesses each disguised node one by one according to the corresponding sequence number, the supervision server verifies the access sequence according to the access records of each disguised node, and after verification, the supervision server controls the disguised node to output the sequence number label of the associated node and send out double-factor verification information to the access terminal;
Step S5, the access terminal feeds back information to the associated node so that the associated node can verify, and the supervision server judges that the access terminal allows the access to the client after meeting the preset condition
The predetermined condition comprises that in the two-factor verification process, the associated node verification feedback information accords with a standard, the accessed times of the associated node accord with the predetermined standard, and the accessed times of the remaining disguised nodes accord with the predetermined standard.
Further, in the step S1, in the association relationship of the masquerading node constructed,
The association relation is synchronously set when the calling of the disguised node is completed;
each disguised node corresponds to an associated disguised node one to one.
Further, in the step S1, the number of calls of the masquerading node is positively correlated with the number of times that the client is accessed in a predetermined time.
Further, in the step S1, the process of calling the real node sequence number stored in the current stage in the storage set and synchronously generating the sequence number sequence includes,
Determining a number of digits of the array at a predetermined ratio based on the number of called masquerading nodes;
And generating a random number sequence with corresponding digits, and placing the real node serial number at the tail part of the random number sequence to obtain the serial number sequence.
Further, in step S4, corresponding disguised nodes are sequentially determined and accessed according to the sequence numbers in the sequence number sequence.
Further, in the step S3, the process of verifying whether the access order verification is passed includes,
Calling access records of each disguised node, determining the access times and access time of the current access terminal for each disguised node, generating an actual access sequence according to the time sequence, comparing with the sequence number sequence,
If the actual access sequence is different from the sequence number sequence, judging that the access sequence verification is not passed;
And if the actual access sequence is the same as the sequence number sequence, judging that the access sequence is verified.
Further, in step S4, the access terminal determines a corresponding association node according to the received sequence number tag, so as to send feedback information generated based on the two-factor verification information to the association node.
Further, in the step S5, in the two-factor authentication process, the associated node is allowed to be accessed only once, the remaining masquerading nodes are not allowed to be accessed,
And if the access times of the associated node or/and the remaining disguised nodes are greater than the predetermined standard, the supervision server judges that the accessed times do not meet the predetermined standard.
Further, in the step S2, the real node sequence number is replaced at intervals of a predetermined time, and the replaced real node sequence number is at least the same as the sequence number corresponding to one disguised node.
Further, in step S3, the authentication performed by the supervision server includes verifying whether the access terminal holds a digital signature.
Compared with the prior art, the invention configures unique serial number labels for the disguised nodes and builds association relation by arranging a plurality of disguised nodes, and monitors each disguised node by arranging the monitoring server connected with each disguised node, and the access sequence is brought into verification, the monitoring server monitors, and after the real node is found, the sending end and the receiving end of the double-factor verification information adopt different forms, so that the multi-dimension protection is carried out on the double-factor verification process, the risk of breaking through verification after the verification information is stolen is reduced, and the safety of the access end for accessing the client is improved.
In particular, the invention considers setting a plurality of disguised nodes to disguise the nodes used for sending the double-factor verification information, the access end needs to access according to the preset sequence, and adopts the supervision server to monitor the access sequence in real time, the access sequence is incorporated into the verification, the risk of traversing the verification after the stealer steals the verification information is reduced, the risk of attacking the nodes for sending the double-factor verification information is reduced, in the actual situation, the access sequence of each access of the access end is different, and the sending end for sending the double-factor verification information is also different each time due to the continuous switching of the serial numbers of the real nodes.
In particular, the invention sets the associated node for each disguised node, after passing the access sequence verification, the access terminal finds the node for sending the double-factor verification, adopts the double-factor verification node to send the verification information, and verifies the disguised node associated with the double-factor verification, thereby facilitating the access terminal to receive the sending object of the corresponding feedback information after receiving the verification information into the verification, protecting the double-factor verification process in a multi-dimension way, reducing the risk of breaking through the verification after the verification information is stolen, and improving the security of the access terminal for accessing the client.
In particular, the verification terminal monitors the double-factor verification process, under the situation of multiple disguised nodes, the sending object of the corresponding feedback information after the access terminal receives the verification information is brought into verification, the double-factor verification process is further protected by multiple dimensions, the risk of breaking through verification after the verification information is stolen is reduced, and the safety of the access terminal accessing the client terminal is improved.
Drawings
FIG. 1 is a schematic diagram of steps of a method for two-factor protection for a client according to an embodiment of the present invention;
FIG. 2 is a diagram of access sequence verification logic decision diagram in accordance with an embodiment of the invention;
FIG. 3 is a logic diagram of a decision whether to allow access to a client in accordance with an embodiment of the present invention;
fig. 4 is a logic decision diagram of whether to control a masquerade node to issue two-factor authentication information according to an embodiment of the invention.
Detailed Description
The invention will be further described with reference to examples for the purpose of making the objects and advantages of the invention more apparent, it being understood that the specific examples described herein are given by way of illustration only and are not intended to be limiting.
Preferred embodiments of the present invention are described below with reference to the accompanying drawings. It should be understood by those skilled in the art that these embodiments are merely for explaining the technical principles of the present invention, and are not intended to limit the scope of the present invention.
In addition, it should be noted that, in the description of the present invention, unless explicitly specified and limited otherwise, the term "connected" should be construed broadly, and for example, it may be a fixed connection, a detachable connection, or an integral connection, it may be a mechanical connection or an electrical connection, it may be a direct connection or an indirect connection through an intermediate medium, or it may be a communication between two elements. The specific meaning of the above terms in the present invention can be understood by those skilled in the art according to the specific circumstances.
Referring to fig. 1 to 3, fig. 1 is a schematic diagram of a method step for performing two-factor protection on a client according to an embodiment of the invention, fig. 2 is an access sequence verification logic decision diagram according to an embodiment of the invention, and fig. 3 is a logic decision diagram for determining whether to allow access to the client according to an embodiment of the invention, where the method for performing two-factor protection on a client according to the invention includes:
Step S1, calling a plurality of disguised nodes, configuring unique serial number labels for the disguised nodes, and setting association relations among the disguised nodes, wherein the calling quantity of the disguised nodes is determined based on the accessed times of a client in a preset time;
Step S2, a supervision server connected with each disguised node is set, a storage set is arranged in the supervision server to store real node serial numbers switched by a preset rule, wherein the supervision server can acquire access records of each disguised node and control data output of the disguised node,
Step S3, the supervision server verifies the identity information of the access terminal after receiving the access request of the access terminal, calls the real node serial numbers stored in the current stage of the storage set, and synchronously generates serial number sequences to feed back to the access terminal;
Step S4, the access terminal accesses each disguised node one by one according to the corresponding sequence number, the supervision server verifies the access sequence according to the access records of each disguised node, and after verification, the supervision server controls the disguised node to output the sequence number label of the associated node and send out double-factor verification information to the access terminal;
Step S5, the access terminal feeds back information to the associated node so that the associated node can verify, and the supervision server judges that the access terminal allows the access to the client after meeting the preset condition
The predetermined condition comprises that in the two-factor verification process, the associated node verification feedback information accords with a standard, the accessed times of the associated node accord with the predetermined standard, and the accessed times of the remaining disguised nodes accord with the predetermined standard.
In particular, the present invention does not limit the specific form of the disguised node, and may be a network entity capable of implementing an authentication task, for example, the disguised node may be a single sub-gateway in a multi-gateway architecture, and a single server node in a server cluster is not described herein.
Specifically, the invention does not limit the form of configuring the serial number label, and preferably, in the invention, the serial number label is a digital label, and only the difference of corresponding disguised nodes needs to be represented.
Specifically, the form of generating the digital signature during identity verification is not limited, the digital signature can be generated by adopting a private key which is distributed to the client in advance, and the verification is performed through a public key, which is the prior art and is not described in detail.
Specifically, the invention is not limited to the form of sending the two-factor authentication information, for example, in the form of sending the authentication code, sending the authentication code as the authentication information,
When the feedback information is verified to be in accordance with the standard, whether the verification code of the feedback is correct is judged, if so, the feedback information is judged to be in accordance with the standard, and if not, the feedback information is judged to be in accordance with the standard, and of course, other forms can be adopted, which are the prior art and are not repeated.
Specifically, in the step S1, in the association relationship of the masquerading node constructed,
The association relation is synchronously set when the calling of the disguised node is completed;
each disguised node corresponds to an associated disguised node one to one.
Specifically, in the step S1, the number of calls of the masquerading node is positively correlated with the number of times the client is accessed in a predetermined time.
In particular, the number of the optional,
Comparing the access times N with a preset first access times comparison threshold N1 and a second access times comparison threshold N2,
If N > N2, the number of calls is [0.6Nm ];
if N1 is less than or equal to N < N2, the calling number is [0.4Nm ];
If N < N1, the number of calls is [0.2Nm ];
Where n2=1.2n0, n1=0.8n0, where n0 represents the average number of accesses measured in advance and Nm represents the total number of callable masquerading nodes.
The invention considers setting a plurality of disguised nodes to disguise the nodes used for sending the double-factor verification information, the access end needs to access according to the preset sequence, and adopts the supervision server to monitor the access sequence in real time, the access sequence is incorporated into verification, the risk of traversing verification after the verification information is stolen by a stealer is reduced, the risk of attacking the nodes for sending the double-factor verification information is reduced, in the actual situation, the access sequence of each access of the access end is different, and the sending end for sending the double-factor verification information is also different each time due to the continuous switching of the serial numbers of the real nodes.
Specifically, in the step S1, the procedure of calling the real node sequence number stored in the current stage in the storage set and synchronously generating the sequence number sequence includes,
Determining a number of digits of the array at a predetermined ratio based on the number of called masquerading nodes;
And generating a random number sequence with corresponding digits, and placing the real node serial number at the tail part of the random number sequence to obtain the serial number sequence.
In this embodiment, taking 10 called disguised nodes as an example and the predetermined ratio is 0.5, a 5-bit random number sequence is generated, and a 6-bit random number sequence is obtained after the tail is provided with a real node sequence number, and finally the sequence number sequence is obtained.
Specifically, in step S4, corresponding masquerading nodes are sequentially determined and accessed according to the sequence numbers in the sequence number sequence.
In this embodiment, the sequence numbers in the sequence number sequence are called one by one according to the sequence order, and the corresponding disguised node is found to access according to the called sequence numbers.
In particular, in the step S3, the process of verifying whether the access order verification is passed includes,
Calling access records of each disguised node, determining the access times and access time of the current access terminal for each disguised node, generating an actual access sequence according to the time sequence, comparing with the sequence number sequence,
If the actual access sequence is different from the sequence number sequence, judging that the access sequence verification is not passed;
And if the actual access sequence is the same as the sequence number sequence, judging that the access sequence is verified.
It can be understood that if no external interference exists, the access terminal accesses according to the sequence number, and the corresponding generated actual access sequence is identical to the sequence number.
In some of the possible embodiments of the present invention,
The actual access sequence can be continuously generated in the access process, and it can be understood that the number of the sequence bits of the actual access sequence at this time is not constant due to the number of the accessed disguised nodes, but the subsequences of the corresponding bits can still be called by the front end of the sequence in the sequence number sequence for comparison, so that whether the sequence passes the sequential verification or not is judged, and the problem is found in time, which is not repeated.
Specifically, referring to fig. 4, the supervision server needs to determine whether the access sequence verification is passed, and if the access sequence verification is passed, the supervision server controls the disguised node to output the two-factor verification information.
Specifically, in step S4, the access terminal determines a corresponding association node according to the received sequence number tag, so as to send feedback information generated based on the two-factor verification information to the association node.
Specifically, in the step S5, in the two-factor authentication process, the associated node is only allowed to be accessed once, the remaining disguised nodes are not allowed to be accessed,
And if the access times of the associated node or/and the remaining disguised nodes are greater than the predetermined standard, the supervision server judges that the accessed times do not meet the predetermined standard.
Specifically, the two-factor verification process includes sending out two-factor verification information until the associated node receives feedback information returned by the access terminal.
According to the invention, the associated node is set for each disguised node, after the access sequence verification is passed, the access terminal finds the node for transmitting the double-factor verification, the double-factor verification node is adopted to transmit the verification information, and the associated disguised node is used for verification, so that the access terminal is convenient to receive the transmission object corresponding to the feedback information after receiving the verification information into the verification, the multi-dimensional protection is carried out on the double-factor verification process, the risk of breaking through the verification after the verification information is stolen is reduced, and the security of the access terminal for accessing the client is improved.
Specifically, in the step S2, the real node sequence number is replaced at intervals of a predetermined time, and the replaced real node sequence number is at least the same as the sequence number corresponding to one disguised node.
It will be appreciated that a real node needs to correspond to one of several disguised node sequence numbers.
Specifically, in the step S3, the authentication performed by the supervision server includes verifying whether the digital signature is held by the access terminal, verifying whether the digital signature is correct,
If the digital signature is held and the digital signature is correct, the identity verification is judged to pass.
Thus far, the technical solution of the present invention has been described in connection with the preferred embodiments shown in the drawings, but it is easily understood by those skilled in the art that the scope of protection of the present invention is not limited to these specific embodiments. Equivalent modifications and substitutions for related technical features may be made by those skilled in the art without departing from the principles of the present invention, and such modifications and substitutions will be within the scope of the present invention.
Claims (9)
1. A method for two-factor protection for a client, comprising:
Step S1, calling a plurality of disguised nodes, configuring unique serial number labels for the disguised nodes, and setting association relations among the disguised nodes, wherein the calling quantity of the disguised nodes is determined based on the accessed times of a client in a preset time;
Step S2, a supervision server connected with each disguised node is set, a storage set is arranged in the supervision server to store real node serial numbers switched by a preset rule, wherein the supervision server can acquire access records of each disguised node and control data output of the disguised node,
Step S3, the supervision server verifies the identity information of the access terminal after receiving the access request of the access terminal, calls the real node serial numbers stored in the current stage of the storage set, and synchronously generates serial number sequences to feed back to the access terminal;
Step S4, the access terminal accesses each disguised node one by one according to the corresponding sequence number, the supervision server verifies the access sequence according to the access records of each disguised node, and after verification, the supervision server controls the disguised node to output the sequence number label of the associated node and send out double-factor verification information to the access terminal;
Step S5, the access terminal feeds back information to the associated node so that the associated node can verify, and the supervision server judges that the access terminal allows the access to the client after meeting the preset condition;
The method comprises the steps that in the two-factor verification process, the associated node verification feedback information accords with a standard, the accessed times of the associated node accord with the predetermined standard, and the accessed times of the remaining disguised nodes accord with the predetermined standard;
in the step S1, the process of calling the real node sequence number stored in the current stage in the storage set and synchronously generating the sequence number sequence includes,
Determining a number of digits of the array at a predetermined ratio based on the number of called masquerading nodes;
And generating a random number sequence with corresponding digits, and placing the real node serial number at the tail part of the random number sequence to obtain the serial number sequence.
2. The method for two-factor protection for client according to claim 1, wherein in the step S1, in the association relationship of the masquerading node constructed,
The association relation is synchronously set when the calling of the disguised node is completed;
each disguised node corresponds to an associated disguised node one to one.
3. The method for two-factor protection for a client according to claim 1, wherein in step S1, the number of calls of the masquerading node is positively correlated with the number of accesses of the client in a predetermined time.
4. The method for two-factor protection for a client according to claim 1, wherein in step S4, corresponding masquerading nodes are sequentially determined and accessed according to sequence numbers in the sequence number sequence.
5. The method for two-factor protection for a client according to claim 1, wherein the step S3 of verifying whether the access sequence verification is passed comprises,
Calling access records of each disguised node, determining the access times and access time of the current access terminal for each disguised node, generating an actual access sequence according to the time sequence, comparing with the sequence number sequence,
If the actual access sequence is different from the sequence number sequence, judging that the access sequence verification is not passed;
And if the actual access sequence is the same as the sequence number sequence, judging that the access sequence is verified.
6. The method for two-factor protection for a client according to claim 1, wherein in step S4, the access terminal determines a corresponding association node according to the received sequence number tag, so as to send feedback information generated based on the two-factor verification information to the association node.
7. The method for two-factor protection for a client according to claim 1, wherein in step S5, the associated node is allowed to be accessed only once during the two-factor authentication, the remaining masquerading nodes are not allowed to be accessed,
And if the access times of the associated node or/and the remaining disguised nodes are greater than the predetermined standard, the supervision server judges that the accessed times do not meet the predetermined standard.
8. The method for two-factor protection for a client according to claim 1, wherein in the step S2, the real node sequence number is replaced every predetermined time, and the replaced real node sequence number is at least the same as the sequence number corresponding to one disguised node.
9. The method for two-factor protection for a client according to claim 1, wherein in step S3, the authentication performed by the supervision server includes verifying whether the access terminal holds a digital signature.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202410407814.0A CN118316671B (en) | 2024-04-07 | 2024-04-07 | Method for protecting client side by double factors |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202410407814.0A CN118316671B (en) | 2024-04-07 | 2024-04-07 | Method for protecting client side by double factors |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN118316671A CN118316671A (en) | 2024-07-09 |
| CN118316671B true CN118316671B (en) | 2025-01-03 |
Family
ID=91720202
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN202410407814.0A Active CN118316671B (en) | 2024-04-07 | 2024-04-07 | Method for protecting client side by double factors |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN118316671B (en) |
Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US10108791B1 (en) * | 2015-03-19 | 2018-10-23 | Amazon Technologies, Inc. | Authentication and fraud detection based on user behavior |
| CN117675199A (en) * | 2023-12-21 | 2024-03-08 | 盐城集结号科技有限公司 | Network security defense system based on RPA |
Family Cites Families (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP2005122560A (en) * | 2003-10-17 | 2005-05-12 | Fujitsu Ltd | Deadlock advance detection program |
| CN114511344A (en) * | 2019-05-09 | 2022-05-17 | 成都天钥科技有限公司 | A control method of Internet dynamic marketing |
-
2024
- 2024-04-07 CN CN202410407814.0A patent/CN118316671B/en active Active
Patent Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US10108791B1 (en) * | 2015-03-19 | 2018-10-23 | Amazon Technologies, Inc. | Authentication and fraud detection based on user behavior |
| CN117675199A (en) * | 2023-12-21 | 2024-03-08 | 盐城集结号科技有限公司 | Network security defense system based on RPA |
Also Published As
| Publication number | Publication date |
|---|---|
| CN118316671A (en) | 2024-07-09 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US6064736A (en) | Systems, methods and computer program products that use an encrypted session for additional password verification | |
| US6128742A (en) | Method of authentication based on intersection of password sets | |
| ES2272824T3 (en) | PROCEDURE AND SYSTEM TO CHECK THE AUTHENTICITY OF A SERVICE PROVIDER IN A COMMUNICATIONS NETWORK. | |
| US5319711A (en) | Wireless device for verifying identification | |
| US9130918B2 (en) | System and method for automatically verifying storage of redundant contents into communication equipments, by data comparison | |
| US8548429B2 (en) | Cellular device security apparatus and method | |
| US7835525B2 (en) | Cryptographic method using dual encryption keys and a wireless local area network (LAN) system therefor | |
| US5216715A (en) | Key distribution in public communication networks taking account of security gradations | |
| US20190044730A1 (en) | Apparatus and method for generating and operating dynamic can id based on hash-based message authentication code | |
| US11223954B2 (en) | Network authentication method, device, and system | |
| CN112422494A (en) | Data transmission method, data security verification method and data transmission system | |
| CN110191467B (en) | Authentication method, equipment, device and storage medium for Internet of things equipment | |
| CN110602055A (en) | Long connection authentication method, device, server and storage medium | |
| CN118316671B (en) | Method for protecting client side by double factors | |
| CN111835504B (en) | Identification code generation method and server | |
| US7752444B2 (en) | System and method for providing identity hiding in a shared key authentication protocol | |
| CN105187417B (en) | Authority acquiring method and apparatus | |
| US20130210391A1 (en) | Method And System For Anonymous Operation Of A Mobile Node | |
| CN114866331A (en) | Dynamic access authentication method under zero trust network, gateway equipment and storage medium | |
| CN112600811B (en) | Tr069 protocol-based automatic authorization CPE method and system | |
| CN113519173A (en) | Wireless devices and network nodes for authenticating device classes and corresponding methods in wireless communication systems | |
| CN112671786A (en) | System and method for safe login based on third party authentication | |
| CN112738751A (en) | Wireless sensor access authentication method, device and system | |
| Wu et al. | Security analysis of a cocktail protocol with the authentication and key agreement on the UMTS | |
| CN114239013A (en) | Access request verification method and related device |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| GR01 | Patent grant | ||
| GR01 | Patent grant |