Method and system for authorizing to acquire terminal attack alarming information log

一种报警信息、日志的技术,应用在通信领域,能够解决终端设备攻击报警信息恶意窃取、无法知晓攻击报警的原因等问题,达到加强安全保密性、确保合法性、确保安全性的效果

Active Publication Date: 2017-02-01
FUJIAN LANDI COMML EQUIP CO LTD
View PDF4 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] To this end, it is necessary to provide a method for authorizing the acquisition of terminal attack alarm information logs to solve the problem that after the terminal equipment is attacked, the cause of the attack alarm cannot be known, and the terminal equipment attack alarm information is arbitrarily maliciously stolen and analyzed.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for authorizing to acquire terminal attack alarming information log
  • Method and system for authorizing to acquire terminal attack alarming information log

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] In order to explain in detail the technical content, structural features, achieved goals and effects of the technical solution, the following will be described in detail in conjunction with specific embodiments and accompanying drawings.

[0028] see figure 1 , in this embodiment, the U-KEY is inserted on the client tool. In this embodiment, the client tool is a PC, wherein the U-KEY stores an operator certificate and an operator private key. When the U-KEY is inserted After being installed on the client tool, interactive software is installed on the client tool, so that the client tool can obtain the operator certificate from the U-KEY and directly use the operator's private key. Secondly, in this embodiment, a specific APP is installed on the PC. On the APP login interface, maintenance personnel need to enter the account and password to log in to the system; through the account and password to log in to the system, the server will judge the authority of the account an...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method and a system for authorizing to acquire a terminal attack alarming information log and belongs to the technical field of communication. The method for authorizing to acquire the terminal attack alarming information log comprises the following steps: after acquiring an authentication account of an attack alarming information log authority by a server, authenticating the legitimacy of a client tool by the server; after the legitimacy passes, sending second data to be authenticated to the client tool by a terminal and sending the data to the server by the client tool; if the authentication of the server on the second data to be authenticated passes, encrypting the second data to be authenticated to generate second authentication data and sending the second authentication data to the terminal; if the authentication of the terminal on the second authentication data passes, acquiring the attack alarming information log by the terminal and encrypting the attack alarming information log; and after encrypting, sending the attack alarming information log to the client tool. A whole process adopts double-factor authentication and ensures the safety; and an instruction of acquiring the terminal attack alarming information log by the terminal is a legal behavior approved by the client and the legitimacy of acquiring an operation instruction is ensured.

Description

technical field [0001] The invention relates to the field of communication technology, in particular to a method and system for authorizing and obtaining terminal attack alarm information logs. Background technique [0002] In the field of financial payment, in order to ensure the security of terminal equipment, after the terminal equipment is attacked, the terminal equipment will enter the attack state, and the attack alarm will be continuously displayed, and the equipment cannot carry out normal payment transactions. In order to analyze the cause of the attack alarm, it is necessary to obtain the log of the attack alarm information from the terminal, and the attack alarm information is sensitive data. If it is randomly obtained and analyzed, it will pose a great threat to the security of the terminal device. Contents of the invention [0003] To this end, it is necessary to provide a method for authorizing the acquisition of terminal attack alarm information logs to solv...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62G06F21/34
CPCG06F21/34G06F21/6218G06F2221/2141G06F21/62G06F21/44H04L63/0823H04L63/0442H04L2463/082H04L63/083G06F21/602G06F21/107
Inventor 陈菲菲林晖
Owner FUJIAN LANDI COMML EQUIP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products