Security scanning method and system

A technology of security scanning and scanning method, which is applied in the direction of transmission system, electrical components, etc., can solve the problems of opacity, unintuitive user interface and operation, and single content of security scanning, so as to achieve diversified content, intuitive user interface and operation, and improve The effect of operating efficiency

Active Publication Date: 2017-01-04
TENCENT TECH (SHENZHEN) CO LTD
View PDF5 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of this, the object of the present invention is to provide a security scanning method and system, which can solve the technical problems of the prior art that the content of the security scan is single, opaque, and the user interface and operation are not intuitive, and greatly improve the operation of data exchange. Efficiency, can effectively avoid misuse

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security scanning method and system
  • Security scanning method and system
  • Security scanning method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0035] see figure 2 , which is a schematic workflow diagram of the security scanning method provided by the embodiment of the invention.

[0036] In step S201, a security scan is performed on the data exchange environment to obtain a scan result.

[0037] In step S202, it is judged according to the scanning result whether the first authentication method is valid, wherein if the first authentication method is valid, then step S203 is executed; if the first authentication method is not valid, then step S204 is executed.

[0038] In step S203, the prompt is a security environment, and the password input by the user is received for authentication.

[0039] In step S204, it is prompted that it is an unsafe environment, and the user's selection of the first authentication method and the second authentication method is received.

[0040] This step can also be understood as receiving the user's selection and judging whether the selection is the first authentication method, wherein ...

Embodiment 2

[0055] see image 3 , which is a schematic workflow diagram of the security scanning method provided by the embodiment of the invention. Understandably, figure 2 yes figure 1 Process optimization of the security scanning method shown. Among them, in order to reflect the figure 1 Zhongyuan steps with figure 2 The difference between the optimization steps in , the original step starts with S20, and the optimization step starts with S30. The following steps are performed in the order in which they appear, unless otherwise indicated.

[0056] In step S301, a first authentication method and a second authentication method are generated.

[0057] It can be understood that the step of generating the authentication method specifically includes:

[0058] (1) Select two authentication methods from a variety of preset authentication methods, including but not limited to shields, digital certificates, text messages, secret codes or tokens, and through the above authentication meth...

Embodiment 3

[0076] see Figure 4 , is a block diagram of the security scanning system provided by the embodiment of the invention.

[0077] The security scanning system 100 includes: an authentication generation module 11 , a scanning bar 12 , a scanning module 13 , a judging module 14 , a first authentication module 15 , a selection bar 16 , a receiving module 17 , and a second authentication module 18 .

[0078] The authentication method generating module 11 is configured to generate the first authentication method and the second authentication method. Specifically, the authentication method generation module 11 includes: a selection submodule and a priority submodule.

[0079] It can be understood that the selection sub-module is used to select two authentication methods from preset authentication methods, wherein the preset authentication methods at least include: shield, digital certificate and short message. The priority sub-module is configured to set priorities for the two authe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a security scanning method and system. The method includes steps: performing security scanning on a data exchange environment to obtain a scanning result; determining whether a first authentication mode is valid according to the scanning result; if yes, prompting the fact that the data exchange environment is a safe environment, and receiving a password input by a user in order to perform authentication; and if not, prompting the fact that the data exchange environment is an unsafe environment, receiving the selection for the first authentication mode and a second authentication mode by the user, enabling the corresponding authentication mode to be valid according to the authentication mode selected by the user, and receiving the password input by the user in order to perform authentication. According to the method and system, through the setting of various authentication modes, the content for security scanning is diversified and transparent, and the user interface and the operation are more visual.

Description

technical field [0001] The invention belongs to the field of Internet security, in particular to a security scanning method and system. Background technique [0002] Different security levels of users lead to different risks faced during data exchange, so different defense measures need to be taken. The assessment of the user's security is usually realized by performing a security scan on the data exchange environment. [0003] Common websites with security scans, such as some ticket buying websites and payment platforms. Wherein, a general ticketing website is authenticated by installing a digital certificate and inputting a correct password by the user, and the content of the security scan is usually only aimed at whether to download the digital certificate in the current data environment. The payment platform usually does not display the content of its security scan, but sometimes requires users to enter other auxiliary verification methods other than passwords, and its...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/08H04L63/1416H04L63/083
Inventor 黎翠霞
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products