CN109002705A - process authentication method, device and server - Google Patents
process authentication method, device and server Download PDFInfo
- Publication number
- CN109002705A CN109002705A CN201810638291.5A CN201810638291A CN109002705A CN 109002705 A CN109002705 A CN 109002705A CN 201810638291 A CN201810638291 A CN 201810638291A CN 109002705 A CN109002705 A CN 109002705A
- Authority
- CN
- China
- Prior art keywords
- certified
- authentication
- authentication processes
- result
- cryptographic hash
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
- G06F21/445—Program or device authentication by mutual authentication, e.g. between devices or programs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a kind of process authentication method, device and servers, and wherein method comprises determining that the process to be certified newly started;By at least two authentication processes the safety of the process to be certified is authenticated respectively, when solving Server master controller and being attacked, the problem of security of system difference.
Description
Technical field
The present invention relates to interprocess communication security technology areas, and in particular to a kind of process authentication method, device and service
Device.
Background technique
With popularizing for video communication technology, more and more users use real-time video communication, and consequent is view
The safety issue of frequency communication process.In order to ensure the safety of video communication process, safeguard technology stresses at this stage
Point focuses mostly in transmission network and the communications field, rarely has the Security Assurance Mechanism inside concern videoconference system server.
In the prior art, for the Security Assurance Mechanism of server internal, the unified protection certification of master controller is taken
The mode of information, in this case, after master controller is attacked, it is understood that there may be detached from master controller and even make use of main control
Device creates the case where malicious process is stolen or forges user data, and the network interface that can use system transfers data to it
He is local.To sum up, after master controller is attacked, the Security Assurance Mechanism of network transmission and the communications field just loses effect,
Entire video conferencing system will be in unsafe state, not can guarantee the safety of video communication.
Summary of the invention
In view of this, the embodiment of the invention provides a kind of process authentication method, device and servers, with settlement server
When master controller is attacked, the problem of security of system difference.
According in a first aspect, the embodiment of the invention provides a kind of process authentication method, including determine newly start wait recognize
Card process;By at least two authentication processes the safety of the process to be certified is authenticated respectively.
With reference to first aspect, in first aspect first embodiment, by least two authentication processes respectively to institute
State process to be certified safety carry out certification include: by described at least two authentication processes respectively to it is described it is to be certified into
For the certification of Cheng Jinhang first to obtain at least two intermediate authentication results, the intermediate authentication result includes reliable result and insincere
As a result;Count the accounting of reliable result described in the intermediate authentication result;When the accounting of the reliable result is more than default
When threshold value, the process safety to be certified is determined.
First embodiment with reference to first aspect, it is described to pass through described at least two in first aspect second embodiment
A authentication processes carry out the first certification to the process to be certified respectively to obtain at least two intermediate authentication results, comprising:
By described at least two authentication processes Hash operation is carried out to the process identification (PID) of the process to be certified respectively, obtain first
Cryptographic Hash;By at least two authentication processes be utilized respectively number of the public spoon to the process to be certified of the process to be certified
Word signature is decrypted, and obtains the second cryptographic Hash;It is respectively compared described in first cryptographic Hash and second cryptographic Hash acquisition
Intermediate authentication result.
Second embodiment with reference to first aspect, it is described to be respectively compared described in first aspect third embodiment
One cryptographic Hash and second cryptographic Hash obtain the intermediate authentication result, comprising: when first cryptographic Hash and described second
When cryptographic Hash is identical, determine that the intermediate authentication result is reliable result;Or when first cryptographic Hash and described second are breathed out
It is uncommon value it is not identical when, determine the intermediate authentication result be insincere result.
Second embodiment with reference to first aspect, in the 4th embodiment of first aspect, the institute of the process to be certified
Stating digital signature is the process to be certified to process identification (PID) progress Hash operation, obtains the number of the process to be certified
Word abstract, and the digital digest is encrypted to obtain according to the private spoon of the process to be certified.
With reference to first aspect, first aspect first embodiment is to the 4th embodiment of first aspect, in first aspect
In five embodiments, described at least two authentication processes be distributed at least two chips of server chips group.
Second embodiment with reference to first aspect, in first aspect sixth embodiment, using described in the progress of MD4 algorithm
Hash operation.
With reference to first aspect, in the 7th embodiment of first aspect, by least two authentication processes distinguish
It, will be described to be certified when determining that the process to be certified is safe after being authenticated to the safety of the process to be certified
The process identification (PID) of process is appended in the list of authentication processes.
According to second aspect, the embodiment of the invention provides a kind of process authentication devices, comprising: determining module, for true
The fixed process to be certified newly started;Authentication module, for by least two authentication processes respectively to the process to be certified
Safety authenticated.
According to the third aspect, the embodiment of the invention provides a kind of server, at least two are stored in the server
Authentication processes, described at least two authentication processes the safety of the process to be certified newly started is authenticated respectively.
In embodiments of the present invention, pass through the process to be certified of acquisition request security credential;Recognize by least two
The mode that card process respectively authenticates the safety of the process to be certified, when treating authentication processes and being authenticated, by
At least two processes carry out respectively, according to the authentication result of at least two processes, finally determine the side of process safety to be certified
Method, when solving Server master controller and being attacked, the problem of security of system difference has reached the technology for improving security of system
Effect.
Detailed description of the invention
The features and advantages of the present invention will be more clearly understood by referring to the accompanying drawings, and attached drawing is schematically without that should manage
Solution is carries out any restrictions to the present invention, in the accompanying drawings:
Fig. 1 shows a kind of flow chart of optional process authentication method according to embodiments of the present invention;
Fig. 2 shows according to embodiments of the present invention under a kind of optional application scenarios process authentication method flow chart;
Fig. 3 shows a kind of optional Inter-Process Communication structure according to embodiments of the present invention;
Fig. 4 shows a kind of schematic diagram of optional process authentication device according to embodiments of the present invention.
Specific embodiment
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with the embodiment of the present invention
In attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is
A part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, those skilled in the art are not having
Every other embodiment obtained under the premise of creative work is made, shall fall within the protection scope of the present invention.
Embodiment one
The embodiment of the invention provides a kind of process authentication method, Fig. 1 shows a kind of optional according to embodiments of the present invention
Process authentication method flow chart, as shown in Figure 1, this method comprises:
Step S11 determines the process to be certified newly started.
Specifically, process to be certified can be the process of newest starting, and the starting of process to be certified can be derived from user
Relevant operation, be also possible to derived from the malicious process that is implanted.
It should be noted that in embodiments of the present invention, can be the process to be certified by newly starting to the certification of process
Request safety certification.That is, upon power-up of the system, application program, that is, corresponding initialization data is removed from solid-state memory
It moves on in running memory, start monitoring information and treats the function that authentication processes are authenticated.
Step S12, by least two authentication processes the safety of the process to be certified is authenticated respectively.
Specifically, the quantity of authentication processes can be two and can be multiple, and authentication processes can be in server
The initialization process of storage, can be and be solidificated in the hardware of server internal, and the starting of the process can be at server bottom
Layer drives after powering on and completes.Treat authentication processes carry out security credential during, at least two authentication processes distinguish
Independent authentication processes for the treatment of carry out security credential.
In embodiments of the present invention, by the authentication processes of at least two in server, authentication processes are treated respectively
The mode for carrying out security credential, overcomes under the mode that master controller uniformly protects authentication information, is attacked in master controller
When hitting, can not carry out security credential to malicious process leads to the problem of security of system difference, effective preventing malice process logarithm
According to steal and forge, reached improve server processes certification safety technical effect.
In a kind of optional embodiment of the present invention, step S12 may include:
Step S121, by described at least two authentication processes respectively to the process to be certified carry out the first certification with
At least two intermediate authentication results are obtained, the intermediate authentication result includes reliable result and insincere result.
Specifically, after the certification request that authentication processes receive the process to be certified newly started, by least two
Each of authentication processes, independently when treating authentication processes and carrying out the first certification, each authentication processes
An intermediate authentication result is obtained, i.e. each the available reliable result of authentication processes or an insincere knot
Fruit.
Step S122 counts the accounting of reliable result described in the intermediate authentication result.
Step S123 determines the process safety to be certified when the accounting of the reliable result is more than preset threshold.
Specifically, preset threshold can be preset numerical value, such as 50%, that is to say, that authenticate among statistics
When as a result, when the accounting of reliable result is more than 50%, process safety to be certified is determined;When the accounting of insincere result is more than
When 50%, determine that process to be certified is dangerous.That is, carrying out first in the safety that authentication processes treat authentication processes
After certification, authentication result is broadcast to other authentication processes, and the intermediate of authentication processes has authenticated knot while listening for other
The broadcast of fruit.Its method counted can be, and count all intermediate authentication results, when the accounting of reliable result is more than preset threshold
When, determine process safety to be certified.Similarly, when insincere result is more than preset threshold, determine that process to be certified is dangerous.Its
The method of statistics is also possible to stop statistics when counting reliable result accounting more than preset threshold, directly give to be certified
The result of process safety.Similarly, when counting insincere result accounting more than preset threshold, stop statistics, directly give to
The unsafe result of authentication processes.
It should be noted that authenticating knot among statistics for each authentication processes obtain intermediate authentication result
In fruit when the accounting of reliable result, its identical or different weighted value can be assigned.
In a kind of optional embodiment of the present invention, step S121, by described at least two authentication processes distinguish
Carrying out the first certification to the process to be certified to obtain at least two intermediate authentication results may include:
By described at least two each of authentication processes respectively to the process identification (PID) of the process to be certified into
Row Hash operation obtains the first cryptographic Hash;
By described at least two authentication processes be utilized respectively the public spoon of the process to be certified to it is described it is to be certified into
The digital signature of journey is decrypted, and obtains the second cryptographic Hash;
It is respectively compared first cryptographic Hash and second cryptographic Hash obtains the intermediate authentication result.
Specifically, in the request safety certification of the process to be certified newly started, the process identification (PID) of itself, number are signed
Name and public spoon are broadcasted to each authentication processes, each authentication processes according to receive process identification (PID), number label
Name and public spoon are treated authentication processes respectively and are authenticated.Each is right when authentication processes are treated authentication processes and authenticated
Process identification (PID) carries out Hash operation can be using MD4 algorithm, MD5 algorithm or SHS algorithm etc..
It should be noted that the digital signature of process to be certified can be breathing out to its process identification (PID) for process to be certified
Uncommon operation, obtains the digital digest of process to be certified, and encrypted to obtain to digital digest according to the private spoon of process to be certified.
It should also be noted that, in embodiments of the present invention, in verification process, being added by private spoon and public spoon
It is close, it is ensured that verification process has credible, uniqueness, avoids information from being forged, improves the confidence level of certification.
In a kind of optional embodiment of the present invention, it is respectively compared first cryptographic Hash and second cryptographic Hash obtains
Obtaining the intermediate authentication result may include:
When first cryptographic Hash is identical as second cryptographic Hash, determine that the intermediate authentication result is credible knot
Fruit;Or when first cryptographic Hash and second cryptographic Hash be not identical, determine that the intermediate authentication result is insincere
As a result.
In a kind of optional embodiment of the present invention, the Hash operation can be carried out using MD4 algorithm.With other Kazakhstan
The algorithm that uncommon operation uses is compared, and the bit that MD4 algorithm occupies is less, arithmetic speed faster, to the occupancy ratio of real resource
It is smaller.Also, by MD4 algorithm carry out Hash operation when, Hash collide a possibility that it is lower.
In a kind of optional embodiment of the present invention, by least two each of authentication processes it is right respectively
After the safety of the process to be certified is authenticated, the method also includes:
When determining that the process to be certified is safe, the process identification (PID) of the process to be certified is appended to authentication processes
List in.
Specifically, after determining process safety to be certified, the process identification (PID) of process to be certified can be appended to and has been recognized
In the list of card process, that is to say, that security credential can be carried out to other processes to be certified by the process.
It should be noted that then the process can be related to the foundation of the whole network process after determining process safety to be certified
Communication, it is on the contrary then data can not be obtained from any process.
Optionally, in any one of the above embodiment, at least two authentication processes be distributed in server new chip
On at least two chips of group.
Specifically, server may include one or more chipset, any one chipset is made of multiple chips,
At least two authentication processes be distributed at least two chips of chipset.Wherein, the quantity of authentication processes can basis
Actual conditions are set, and the quantity of authentication processes is more, and the distribution on chip more disperses, and the safety of system is got over
It is high.For example, when at least running an authentication processes on each chip of server chips group, a certain process or certain
When several processes are under attack, it can guarantee the safety of system to greatest extent.
Below by concrete application scene, process authentication method is provided to the embodiment of the present invention and is illustrated, such as Fig. 2 institute
Show, this method may include:
Step S1 starts initialization process;
Necessary initialization operation is completed, application program and corresponding initialization data are moved from solid-state memory to fortune
In row memory.
Step S2, starting monitoring information and the function of authenticating other processes;
Fig. 3 shows a kind of optional Inter-Process Communication structure according to embodiments of the present invention.
Step S3 receives the certification message of the request safety certification of process to be certified;
Certification message includes process identification (PID), digital signature and the public spoon information of process to be certified.
Step S4 treats the process identification (PID) of authentication processes by least two authentication processes, and MD4 algorithm is utilized to carry out
Hash operation obtains the first cryptographic Hash;
The process to be certified newly started carries out Hash operation by the process identification (PID) of itself, by MD4 algorithm, and operation result is
Digital digest encrypts digital digest using private spoon, obtains digital signature.
Step S5 treats the number of authentication processes using the public spoon of process to be certified by least two authentication processes
Signature is decrypted, and obtains the second cryptographic Hash.
Step S6 judges whether the first cryptographic Hash is identical as the second cryptographic Hash;
Step S7 determines that the intermediate authentication result of process to be certified is when the first cryptographic Hash is identical as the second cryptographic Hash
Reliable result;
Step S8 determines the intermediate authentication result of process to be certified when the first cryptographic Hash and the second cryptographic Hash be not identical
For insincere result;
Step S9, the whole network broadcast intermediate authentication result;
After authentication processes obtain the intermediate authentication result of process to be certified, which is broadcast to other
Authentication processes, and while listening for the broadcast of other intermediate authentication results of authentication processes.
Step S10 counts the accounting of reliable result at least two intermediate authentication results;
Whether step S11 judges the accounting of reliable result more than 50%;
Step S12 determines process safety to be certified when the accounting of reliable result is more than 50%;
Step S13 determines that process to be certified is dangerous when the credible accounting recorded a demerit is less than or equal to 50%;
Step S14, when process to be certified is safe, process to be certified establishes relevant communication to the whole network.
In embodiments of the present invention, by the authentication processes of at least two in server, authentication processes are treated respectively
The mode for carrying out security credential, overcomes under the mode that master controller uniformly protects authentication information, is attacked in master controller
When hitting, can not carry out security credential to malicious process leads to the problem of security of system difference, effective preventing malice process logarithm
According to steal and forge, reached improve server processes certification safety technical effect.
Embodiment two
Fig. 4 shows a kind of schematic diagram of optional process authentication device according to embodiments of the present invention, as shown in figure 4, should
Device includes:
Determining module 41, for determining the process to be certified newly started;It refers in embodiment one, the description of step S11.
Authentication module 42, for by least two authentication processes the safety of the process to be certified is carried out respectively
Certification.It refers in embodiment one, the description of step S12.
In embodiments of the present invention, recognized by obtaining module 41 for the process to be certified of acquisition request security credential
Demonstrate,prove module 42, for by least two each of authentication processes the safety of the process to be certified is carried out respectively
The mode of certification overcomes under the mode that master controller uniformly protects authentication information, when master controller is attacked, safety
The problem of difference has reached the technical effect for improving the safety of server processes certification.
In a kind of optional embodiment of the present invention, authentication module 42 may include:
Authentication unit, for by described at least two authentication processes first carried out to the process to be certified respectively recognize
For card to obtain at least two intermediate authentication results, the intermediate authentication result includes reliable result and insincere result;It refers to
In embodiment one, the description of step S121.
Statistic unit, for counting the accounting of reliable result described in the intermediate authentication result;Refer to embodiment one
In, the description of step S122.
Determination unit, for determining the process to be certified when the accounting of the reliable result is more than preset threshold
Safety.It refers in embodiment one, the description of step S123.
Embodiment three
A kind of server is additionally provided according to embodiments of the present invention, and at least two authentication processes are stored in server,
Described at least two authentication processes the safety of the process to be certified newly started is authenticated respectively.
It is that can lead to it will be understood by those skilled in the art that realizing all or part of the process in above-described embodiment method
Computer program is crossed to instruct relevant hardware and complete, the program can be stored in a computer-readable storage medium
In, the program is when being executed, it may include such as the process of the embodiment of above-mentioned each method.Wherein, the storage medium can for magnetic disk,
CD, read-only memory (Read-Only Memory, ROM), random access memory (Random Access
Memory, RAM), flash memory (Flash Memory), hard disk (Hard Disk Drive, abbreviation: HDD) or solid state hard disk
(Solid-State Drive, SSD) etc.;The storage medium can also include the combination of the memory of mentioned kind.
Although being described in conjunction with the accompanying the embodiment of the present invention, those skilled in the art can not depart from the present invention
Spirit and scope in the case where various modifications and variations can be made, such modifications and variations are each fallen within by appended claims institute
Within the scope of restriction.
Claims (10)
1. a kind of process authentication method characterized by comprising
Determine the process to be certified newly started;
By at least two authentication processes the safety of the process to be certified is authenticated respectively.
2. the method according to claim 1, wherein by least two authentication processes respectively to described wait recognize
The safety of card process carries out certification
By described at least two authentication processes the first certification is carried out to obtain at least two to the process to be certified respectively
Intermediate authentication result, the intermediate authentication result include reliable result and insincere result;
Count the accounting of reliable result described in the intermediate authentication result;
When the accounting of the reliable result is more than preset threshold, the process safety to be certified is determined.
3. according to the method described in claim 2, it is characterized in that, it is described by described at least two authentication processes it is right respectively
The process to be certified carries out the first certification to obtain at least two intermediate authentication results, comprising:
By described at least two authentication processes Hash operation is carried out to the process identification (PID) of the process to be certified respectively, obtain
First cryptographic Hash;
By described at least two authentication processes be utilized respectively the public spoon of the process to be certified to the process to be certified
Digital signature is decrypted, and obtains the second cryptographic Hash;
It is respectively compared first cryptographic Hash and second cryptographic Hash obtains the intermediate authentication result.
4. according to the method described in claim 3, it is characterized in that, described be respectively compared first cryptographic Hash and described second
Cryptographic Hash obtains the intermediate authentication result, comprising:
When first cryptographic Hash is identical as second cryptographic Hash, determine that the intermediate authentication result is reliable result;Or
Person
When first cryptographic Hash and second cryptographic Hash be not identical, determine that the intermediate authentication result is insincere knot
Fruit.
5. according to the method described in claim 3, it is characterized in that, the digital signature of the process to be certified be it is described to
Authentication processes carry out Hash operation to the process identification (PID), obtain the digital digest of the process to be certified, and according to described
The private spoon of process to be certified is encrypted to obtain to the digital digest.
6. method according to any one of claims 1-5, which is characterized in that described at least two authentication processes distributions
In at least two chips of server chips group.
7. according to the method described in claim 3, it is characterized in that, carrying out the Hash operation using MD4 algorithm.
8. the method according to claim 1, wherein by least two authentication processes respectively to it is described to
After the safety of authentication processes is authenticated, the method also includes:
When determining that the process to be certified is safe, the process identification (PID) of the process to be certified is appended to the column of authentication processes
In table.
9. a kind of process authentication device characterized by comprising
Determining module, for determining the process to be certified newly started;
Authentication module, for by least two authentication processes the safety of the process to be certified is authenticated respectively.
10. a kind of server, which is characterized in that it is stored at least two authentication processes in the server, described at least two
The safety of the process to be certified newly started is authenticated respectively in a authentication processes.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810638291.5A CN109002705B (en) | 2018-06-20 | 2018-06-20 | Process authentication method and device and server |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810638291.5A CN109002705B (en) | 2018-06-20 | 2018-06-20 | Process authentication method and device and server |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109002705A true CN109002705A (en) | 2018-12-14 |
CN109002705B CN109002705B (en) | 2021-07-06 |
Family
ID=64601225
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810638291.5A Active CN109002705B (en) | 2018-06-20 | 2018-06-20 | Process authentication method and device and server |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109002705B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP3674938A3 (en) * | 2020-01-13 | 2020-09-16 | CyberArk Software Ltd. | Identifying computing processes on automation servers |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102223242A (en) * | 2010-04-15 | 2011-10-19 | 腾讯数码(天津)有限公司 | Method and system for verifying authenticity of group members in SNS (social networking service) community |
CN102646173A (en) * | 2012-02-29 | 2012-08-22 | 成都新云软件有限公司 | Safety protection control method and system based on white and black lists |
CN103235914A (en) * | 2013-04-27 | 2013-08-07 | 上海海事大学 | Cloud malice detection engine identification method |
CN103955438A (en) * | 2014-05-21 | 2014-07-30 | 南京大学 | Process memory protecting method based on auxiliary virtualization technology for hardware |
CN104158816A (en) * | 2014-08-25 | 2014-11-19 | 中国科学院声学研究所 | Authentication method and device as well as server |
CN104461830B (en) * | 2014-12-19 | 2017-09-22 | 北京奇虎科技有限公司 | The method and apparatus of monitoring process |
-
2018
- 2018-06-20 CN CN201810638291.5A patent/CN109002705B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102223242A (en) * | 2010-04-15 | 2011-10-19 | 腾讯数码(天津)有限公司 | Method and system for verifying authenticity of group members in SNS (social networking service) community |
CN102646173A (en) * | 2012-02-29 | 2012-08-22 | 成都新云软件有限公司 | Safety protection control method and system based on white and black lists |
CN103235914A (en) * | 2013-04-27 | 2013-08-07 | 上海海事大学 | Cloud malice detection engine identification method |
CN103955438A (en) * | 2014-05-21 | 2014-07-30 | 南京大学 | Process memory protecting method based on auxiliary virtualization technology for hardware |
CN104158816A (en) * | 2014-08-25 | 2014-11-19 | 中国科学院声学研究所 | Authentication method and device as well as server |
CN104461830B (en) * | 2014-12-19 | 2017-09-22 | 北京奇虎科技有限公司 | The method and apparatus of monitoring process |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP3674938A3 (en) * | 2020-01-13 | 2020-09-16 | CyberArk Software Ltd. | Identifying computing processes on automation servers |
US10812272B1 (en) | 2020-01-13 | 2020-10-20 | Cyberark Software Ltd. | Identifying computing processes on automation servers |
Also Published As
Publication number | Publication date |
---|---|
CN109002705B (en) | 2021-07-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20210295327A1 (en) | Unique transaction identifier, which may also include a time expiration value, is assigned by a first network website to an electronic instruction to collect specified distinctive identifiers from a local/mobile computing device seeking access to said first network website | |
CN115189927B (en) | Zero trust-based power network safety protection method | |
US8091120B2 (en) | Adaptive authentication methods, systems, devices, and computer program products | |
EP2875460B1 (en) | Anti-cloning system and method | |
CN108964885B (en) | Authentication method, device, system and storage medium | |
US20180191697A1 (en) | Multi-party authentication in a zero-trust distributed system | |
US20140189807A1 (en) | Methods, systems and apparatus to facilitate client-based authentication | |
KR20180026508A (en) | A security verification method based on biometric characteristics, a client terminal, and a server | |
US20160182491A1 (en) | Methods, systems and apparatus to manage an authentication sequence | |
EP3231128A1 (en) | Conditional login promotion | |
CN110830446B (en) | SPA security verification method and device | |
CN113992354A (en) | Identity authentication method, device, equipment and machine readable storage medium | |
CN103780609A (en) | Cloud data processing method and device and cloud data security gateway | |
CN114513786A (en) | 5G feeder automation access control method, device and medium based on zero trust | |
US20210067961A1 (en) | Secure simultaneous authentication of equals anti-clogging mechanism | |
CN109002705A (en) | process authentication method, device and server | |
CN116318912B (en) | Dynamic network interface hiding method | |
US11177958B2 (en) | Protection of authentication tokens | |
CN115460015A (en) | TOTP-based identity authentication method and system for Web application | |
CN115277240A (en) | Authentication method and device for Internet of things equipment | |
CN111064731B (en) | Identification method and identification device for access authority of browser request and terminal | |
CN114024682A (en) | Cross-domain single sign-on method, service equipment and authentication equipment | |
CN109617898B (en) | Remote authentication method, device, equipment and storage medium thereof | |
WO2021156746A1 (en) | A method, a system and a biometric server for controlling access of users to desktops in an organization | |
US20110107394A1 (en) | Authentication methods and devices |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |