Locking method for remote user, unlocking method and device

A remote user, unlocking technology, applied in the field of network communication, can solve problems such as vulnerability to attack security, and achieve the effect of improving network security and avoiding illegal operations

Active Publication Date: 2015-07-01
INST OF INFORMATION ENG CAS
View PDF4 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The technical problem to be solved by the present invention is to provide a locking method, unlocking method and device for remote users to solve the problem in the prior art that remote users are easily attacked and have poor security when performing locking and unlocking operations

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Locking method for remote user, unlocking method and device
  • Locking method for remote user, unlocking method and device
  • Locking method for remote user, unlocking method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] The present invention provides an authentication method and device for a ubiquitous terminal network. The present invention will be further described in detail below in conjunction with the accompanying drawings. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0038] Such as figure 1 As shown, embodiments of the present invention provide a method for locking remote users. Based on the client, the method may include:

[0039] S11, receiving a decryption password input by the user for decrypting the account;

[0040] S12. If none of the decryption passwords input within the preset times can successfully decrypt the account, send a first lock request to the security authentication server, where the first lock request carries client identity verification information;

[0041] S13. If the first lock request is approved by the security authentication server, lock the a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a locking method for a remote user, and an unlocking method and device, relates to the technical field of network communication, and aims at solving the problem that the attack easily occurs while unlocking and locking the remote user and the safety is poor in the prior art. The locking method comprises the steps of receiving an encrypting command inputted by a user to encrypt an account; sending a first locking request to a security authentication server if the account cannot be successfully encrypted after inputting the encrypting command at preset times, wherein the first locking request carries the client identity verification information; if the first locking request is audited and passed by the security authentication server, locking the account.

Description

technical field [0001] The invention relates to the technical field of network communication, in particular to a locking method, an unlocking method and a device for a remote user. Background technique [0002] With the rapid development of information technology and the wide application of computer networks, the degree of data sharing is getting higher and higher. At this time, the development of informatization is advancing by leaps and bounds, and it has become an effective means to expand information disclosure, promote the sharing of information resources, and improve administrative efficiency. People are increasingly relying on computers while changing the old manual work methods. Some important information in the network involves a wide range of information, and once it is wrong, it will have a huge impact and serious consequences. Especially in today's large-scale cascade network, the distribution range may involve multi-level interconnections such as the central go...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/24H04L12/12
Inventor 王妍毛锐胡波丁楠李志谦徐国坤
Owner INST OF INFORMATION ENG CAS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products