Enterprise internal database login verification method, device and system

A login verification and database technology, which is applied in the field of enterprise internal database login verification, can solve the problems of low reliability and achieve high reliability and high security

Pending Publication Date: 2020-02-18
北京融易做科技有限公司
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, the reliability of the captcha method is low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Enterprise internal database login verification method, device and system
  • Enterprise internal database login verification method, device and system
  • Enterprise internal database login verification method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] The invention discloses an enterprise internal database login verification method, device and system. When a user terminal sends a login request to the enterprise internal database, the enterprise internal database generates a verification code message and sends it to the internal user group for the user terminal to receive from internal users. The group obtains the verification code message and logs into the internal database of the enterprise.

[0054] Since the internal user group only includes internal users of the enterprise, only the internal users of the enterprise can receive the verification code message, so the security is relatively high; moreover, the verification code message can be received timely and accurately through the internal user group, so the reliability is high . Since the instant messaging software for operating internal user groups is temporarily free to use, it will not increase the operating cost of the enterprise.

[0055] The following wil...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an enterprise internal database login verification method, device and system, and the method is used for an enterprise internal database, and comprises the steps: judging whether a user recognition is corresponding to a legal user or not according to the user recognition in a login request after the login request transmitted by a user terminal is received; generating a verification code message under the condition of determining that the user identifier corresponds to a legal user; determining an internal user group identifier corresponding to the user identifier; and sending the verification code message to an internal user group corresponding to the internal user group identifier. Because the internal user group only comprises the enterprise internal users, only the enterprise internal users can receive the verification code message, and the safety is high. And moreover, the verification code message can be timely and accurately received through the internal user group, so that the reliability is relatively high. As the instant messaging software for operating the internal user group is temporarily used for free, the operation cost of an enterprise is not increased.

Description

technical field [0001] The present application relates to the field of communication technology, and in particular to a method, device and system for login and verification of an internal database of an enterprise. Background technique [0002] Most enterprises have internal systems, and internal systems usually store a large amount of internal data. For security reasons, usually only internal users of the enterprise are allowed to access. In order to further protect the internal system, the internal system has added a login verification operation. Most internal systems use graphic verification codes or SMS verification codes to verify user identities on the login page. [0003] In recent years, OCR image recognition technology has become more and more accurate. People with ulterior motives often write malicious programs, use OCR image recognition technology to identify graphic verification codes and maliciously log into the internal system. Therefore, the security of adop...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/31H04L12/58
CPCG06F21/31H04L51/04
Inventor 杨光
Owner 北京融易做科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products