[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN113190820A - Fingerprint login method and device based on bastion machine - Google Patents

Fingerprint login method and device based on bastion machine Download PDF

Info

Publication number
CN113190820A
CN113190820A CN202110584273.5A CN202110584273A CN113190820A CN 113190820 A CN113190820 A CN 113190820A CN 202110584273 A CN202110584273 A CN 202110584273A CN 113190820 A CN113190820 A CN 113190820A
Authority
CN
China
Prior art keywords
user
fingerprint
login
code file
feature code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110584273.5A
Other languages
Chinese (zh)
Inventor
肖强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Suninfo Technology Co ltd
Original Assignee
Shanghai Suninfo Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Suninfo Technology Co ltd filed Critical Shanghai Suninfo Technology Co ltd
Priority to CN202110584273.5A priority Critical patent/CN113190820A/en
Publication of CN113190820A publication Critical patent/CN113190820A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The application aims to provide a fingerprint login scheme based on a bastion machine. According to the scheme, fingerprint information of a user is recorded, a corresponding fingerprint feature code file is generated based on the fingerprint information, and the fingerprint feature code file is uploaded to a bastion machine server; then, based on a login request command of the user, a fingerprint feature code file corresponding to the user is requested from the bastion machine server, and the fingerprint feature code file corresponding to the user is obtained; in the login authentication process, current fingerprint information is recorded, and whether login is allowed or not is judged by comparing the current fingerprint information with a fingerprint feature code file corresponding to the user. The password login method and the password login system can avoid potential leakage and intrusion risks caused by the password login mode, can reduce complex work of a system setting layer, and can be conveniently deployed, implemented and operated by taking human body characteristics as carriers, so that a user can conveniently operate and use the password login method and the password login system.

Description

Fingerprint login method and device based on bastion machine
Technical Field
The application relates to the technical field of information, in particular to a fingerprint login technology based on a fortress machine.
Background
With the advancement of the national information industry, information security is increasingly receiving attention from governments and enterprises. After the construction of various IT infrastructures is completed, the operation and maintenance work of IT equipment becomes more and more complicated, and the operation and maintenance management system is produced in the situation. The operation and maintenance management system is used as an intermediate layer between a user and target equipment, and needs to complete agent operation and maintenance processes of various protocols and realize related management and control functions, wherein an important module is a login verification system.
At present, the mainstream equipment of an industrial user logs in an operation and maintenance management system in a single mode, and the logging is realized mainly by adopting modes such as password logging, Radius authentication, LDAP authentication, dynamic password token and the like. Although some related operations can be realized by using the login modes, the login modes also have some defects: (1) under the password login mode, because the password is not modified for a long time, or the password is too short in length and low in complexity, potential risks can be buried in the system, and the user can be inconveniently used and has poor experience due to the storage and the memorization of the complicated and too long password; (2) the self limitation of the dynamic token is that the dynamic token needs to be carried about, and when the token is lost, the replacement is troublesome when the token is overdue; (3) the complicated construction and the complicated setting of Radius authentication and LDAP authentication bring some unnecessary maintenance workload to users.
Disclosure of Invention
An object of the application is to provide a fingerprint login method and device based on a bastion machine.
According to one aspect of the application, a bastion machine-based fingerprint login method is provided, wherein the method comprises the following steps:
recording fingerprint information of a user, generating a corresponding fingerprint feature code file based on the fingerprint information, and uploading the fingerprint feature code file to a bastion machine server;
based on the login request command of the user, requesting a fingerprint feature code file corresponding to the user from the bastion machine server to obtain the fingerprint feature code file corresponding to the user;
and recording the current fingerprint information, and judging whether login is allowed or not by comparing the current fingerprint information with the fingerprint feature code file corresponding to the user.
Further, the method further comprises: before the fingerprint information of the user is recorded, a management password is distributed through a login interface; and if the user passes the verification based on the management password, entering an account registration binding page.
Further, the fingerprint information of the user is recorded, and the fingerprint information comprises: and after entering the account registration binding page, calling a fingerprint tool program to record the fingerprint information of the user.
Further, by comparing the current fingerprint information with the fingerprint feature code file corresponding to the user, whether login is allowed or not is judged, including: if the current fingerprint information is matched with the fingerprint feature code file corresponding to the user, allowing login; and if the current fingerprint information is not matched with the fingerprint feature code file corresponding to the user, not allowing login.
Further, by comparing the current fingerprint information with the fingerprint feature code file corresponding to the user, whether login is allowed is judged, which further includes: if the current fingerprint information is matched with the fingerprint feature code file corresponding to the user, login is allowed, and prompt information about successful login is sent to the user; and if the current fingerprint information is not matched with the fingerprint feature code file corresponding to the user, not allowing login, and sending prompt information about login failure to the user.
According to another aspect of the application, a bastion machine-based fingerprint login method is further provided, wherein the method comprises the following steps:
recording fingerprint information of a user at a client, generating a corresponding fingerprint feature code file based on the fingerprint information, and uploading the fingerprint feature code file to a bastion server;
the bastion machine server establishes the association relationship between the fingerprint feature code file and the user and stores the fingerprint feature code file;
the client requests the fingerprint feature code file corresponding to the user from the bastion machine server based on the login request command of the user;
the bastion machine server issues a fingerprint feature code file corresponding to the user to the client;
and recording current fingerprint information at the client, and judging whether login is allowed or not by comparing the current fingerprint information with the fingerprint feature code file corresponding to the user.
Further, the method further comprises: before the client logs in the fingerprint information of the user, a management password is distributed through a login interface; and if the user passes the verification based on the management password, the client enters an account registration binding page.
According to still another aspect of the application, a bastion machine-based fingerprint login device is further provided, wherein the device comprises:
the system comprises a first module, a second module and a third module, wherein the first module is used for recording fingerprint information of a user, generating a corresponding fingerprint feature code file based on the fingerprint information and uploading the fingerprint feature code file to a bastion machine server;
the second module is used for requesting the fingerprint feature code file corresponding to the user from the bastion machine server based on the login request command of the user and acquiring the fingerprint feature code file corresponding to the user;
and the third module is used for recording the current fingerprint information and judging whether login is allowed or not by comparing the current fingerprint information with the fingerprint feature code file corresponding to the user.
According to yet another aspect of the application, there is also provided a computing device, wherein the device comprises a memory for storing computer program instructions and a processor for executing the computer program instructions, wherein the computer program instructions, when executed by the processor, trigger the device to perform the bastion-based fingerprint login method.
According to yet another aspect of the application, a computer readable medium is further provided, on which computer program instructions are stored, the computer readable instructions being executable by a processor to implement the bastion-based fingerprint login method.
According to the scheme, fingerprint information of a user is recorded, a corresponding fingerprint feature code file is generated based on the fingerprint information, and the fingerprint feature code file is uploaded to a bastion server; then, based on a login request command of the user, a fingerprint feature code file corresponding to the user is requested from the bastion machine server, and the fingerprint feature code file corresponding to the user is obtained; in the login authentication process, current fingerprint information is recorded, and whether login is allowed or not is judged by comparing the current fingerprint information with a fingerprint feature code file corresponding to the user. The password login method and the password login system can avoid potential leakage and intrusion risks caused by the password login mode, can reduce complex work of a system setting layer, and can be conveniently deployed, implemented and operated by taking human body characteristics as carriers, so that a user can conveniently operate and use the password login method and the password login system.
Drawings
Other features, objects and advantages of the present application will become more apparent upon reading of the following detailed description of non-limiting embodiments thereof, made with reference to the accompanying drawings in which:
FIG. 1 is a flow chart of a bastion machine-based fingerprint login method according to an embodiment of the application;
FIG. 2 is a flow chart of bastion fingerprint registration according to an embodiment of the application;
figure 3 is a schematic diagram of a bastion machine-based fingerprint login device according to an embodiment of the application.
The same or similar reference numbers in the drawings identify the same or similar elements.
Detailed Description
The present application is described in further detail below with reference to the attached figures.
In a typical configuration of the present application, the terminal, the device serving the network, and the trusted party each include one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.
Computer-readable media, which include both non-transitory and non-transitory, removable and non-removable media, may implement the information storage by any method or technology. The information may be computer readable instructions, data structures, program means, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Disks (DVD) or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device.
The embodiment of the application provides a fingerprint login method based on a bastion machine, which can avoid potential leakage and intrusion risks caused by a password login mode, reduce complex work of a system setting layer, and meanwhile, can be conveniently deployed, implemented and operated by taking human body characteristics as a carrier, so that a user can conveniently operate and use the fingerprint login method. The embodiment of the application is applied to the fortress machine operation and maintenance management system, fingerprint login can be successfully achieved, the adaptability and the universality of a fortress machine login mode can be improved, and the user experience of the fortress machine is improved to a certain extent.
In a practical scenario, the device implementing the method may be a user equipment, a network device, or a device formed by integrating the user equipment and the network device through a network. The user equipment includes, but is not limited to, a terminal device such as a smartphone, a tablet computer, a Personal Computer (PC), and the like, and the network device includes, but is not limited to, a network host, a single network server, multiple network server sets, or a cloud computing-based computer set. Here, the Cloud is made up of a large number of hosts or web servers based on Cloud Computing (Cloud Computing), which is a type of distributed Computing, one virtual computer consisting of a collection of loosely coupled computers.
Fig. 1 is a flowchart of a bastion machine-based fingerprint login method according to an embodiment of the present application, and the method includes step S101, step S102 and step S103.
In some embodiments, the bastion machine-based fingerprint login method further comprises the following steps: before the step S101, assigning an administrative password through a login interface; and if the user passes the verification based on the management password, entering an account registration binding page.
For example, as shown in fig. 2, a fingerprint binding registration operation may be added before the bastion initiates fingerprint login. Namely, fingerprint registration is performed first, and then fingerprint authentication is performed. Specifically, in the fingerprint registration process, a management password is allocated to a bastion machine login interface in advance, and a user enters an account registration binding page after passing the management password. Before the bastion machine starts fingerprint login, fingerprint binding and registering operations are added, so that the safety of the system can be improved.
Here, the step S101, the step S102, and the step S103 are all implemented on the bastion client. The fingerprint login method based on the bastion machine can be adopted no matter the bastion machine adopts a CS or BS framework.
And S101, recording fingerprint information of a user, generating a corresponding fingerprint feature code file based on the fingerprint information, and uploading the fingerprint feature code file to a bastion server.
For example, the client calls a fingerprint tool program to record fingerprints, after the fingerprints are successfully recorded, the corresponding fingerprint feature code file is uploaded to the bastion server, and the server program establishes an association relationship between the fingerprint feature code file and the corresponding user account and stores the file.
In some embodiments, the step S101 includes: and after entering the account registration binding page, calling a fingerprint tool program to record the fingerprint information of the user. In this case, the user can conveniently log in by setting the account registration binding page and calling the fingerprint tool program.
And step S102, based on the login request command of the user, requesting the fingerprint feature code file corresponding to the user from the bastion machine server, and acquiring the fingerprint feature code file corresponding to the user.
For example, after the fingerprint enrollment of the user is completed, a fingerprint login function may be started for the account of the user. When a user inputs an account name at a client and requests login (namely, sends a login request command), the client requests a fingerprint feature code file of a corresponding account from a bastion machine server, and then the bastion machine server sends the corresponding fingerprint feature code file to the client.
Step S103, recording the current fingerprint information, and judging whether login is allowed or not by comparing the current fingerprint information with the fingerprint feature code file corresponding to the user.
For example, when a user logs in through fingerprint authentication, the client calls a fingerprint tool program authentication module to log in current fingerprint information, compares the current fingerprint information with a fingerprint feature code file issued by a server to obtain a comparison result, and then judges whether to allow login according to the comparison result.
In some embodiments, the step S103 includes: if the current fingerprint information is matched with the fingerprint feature code file corresponding to the user, allowing login; and if the current fingerprint information is not matched with the fingerprint feature code file corresponding to the user, not allowing login. And judging whether login is allowed or not according to the comparison result of the current fingerprint information and the fingerprint feature code file corresponding to the user, thereby effectively realizing fingerprint login based on the bastion machine.
In some embodiments, the step S103 further comprises: if the current fingerprint information is matched with the fingerprint feature code file corresponding to the user, login is allowed, and prompt information about successful login is sent to the user; and if the current fingerprint information is not matched with the fingerprint feature code file corresponding to the user, not allowing login, and sending prompt information about login failure to the user. And judging whether login is allowed or not according to the comparison result of the current fingerprint information and the fingerprint feature code file corresponding to the user, and sending prompt information about whether login is successful or not to the user, so that better fingerprint login experience is provided for the user.
The embodiment of the application provides a fingerprint login method based on a bastion machine, which comprises the following steps: recording fingerprint information of a user at a client, generating a corresponding fingerprint feature code file based on the fingerprint information, and uploading the fingerprint feature code file to a bastion server; the bastion machine server establishes the association relationship between the fingerprint feature code file and the user and stores the fingerprint feature code file; the client requests the fingerprint feature code file corresponding to the user from the bastion machine server based on the login request command of the user; the bastion machine server issues a fingerprint feature code file corresponding to the user to the client; and recording current fingerprint information at the client, and judging whether login is allowed or not by comparing the current fingerprint information with the fingerprint feature code file corresponding to the user.
In some embodiments, the method further comprises: before the client logs in the fingerprint information of the user, a management password is distributed through a login interface; and if the user passes the verification based on the management password, the client enters an account registration binding page.
For example, as shown in fig. 2, a fingerprint binding registration operation may be added before the bastion initiates fingerprint login. Namely, fingerprint registration is performed first, and then fingerprint authentication is performed. Specifically, in the fingerprint registration process, a management password is allocated to a bastion machine login interface in advance, and a user enters an account registration binding page after passing the management password. Before the bastion machine starts fingerprint login, fingerprint binding and registering operations are added, so that the safety of the system can be improved.
Fig. 3 is a schematic diagram of a bastion machine-based fingerprint login device according to an embodiment of the application, and the device comprises a first module 301, a second module 302 and a third module 303.
In some embodiments, the bastion machine based fingerprint login device is further configured to: before executing the first module 301, assigning an administrative password through a login interface; and if the user passes the verification based on the management password, entering an account registration binding page.
For example, as shown in fig. 2, a fingerprint binding registration operation may be added before the bastion initiates fingerprint login. Namely, fingerprint registration is performed first, and then fingerprint authentication is performed. Specifically, in the fingerprint registration process, a management password is allocated to a bastion machine login interface in advance, and a user enters an account registration binding page after passing the management password. Before the bastion machine starts fingerprint login, fingerprint binding and registering operations are added, so that the safety of the system can be improved.
Here, the first module 301, the second module 302 and the third module 303 are all implemented on the bastion client side. No matter the bastion machine adopts a CS or BS framework, the fingerprint login equipment based on the bastion machine can be adopted.
The first module 301 logs in fingerprint information of a user, generates a corresponding fingerprint feature code file based on the fingerprint information, and uploads the fingerprint feature code file to the bastion server.
For example, the client calls a fingerprint tool program to record fingerprints, after the fingerprints are successfully recorded, the corresponding fingerprint feature code file is uploaded to the bastion server, and the server program establishes an association relationship between the fingerprint feature code file and the corresponding user account and stores the file.
In some embodiments, the first module 301 is configured to: and after entering the account registration binding page, calling a fingerprint tool program to record the fingerprint information of the user. In this case, the user can conveniently log in by setting the account registration binding page and calling the fingerprint tool program.
The second module 302 requests the fingerprint feature code file corresponding to the user from the bastion machine server based on the login request command of the user, and acquires the fingerprint feature code file corresponding to the user.
For example, after the fingerprint enrollment of the user is completed, a fingerprint login function may be started for the account of the user. When a user inputs an account name at a client and requests login (namely, sends a login request command), the client requests a fingerprint feature code file of a corresponding account from a bastion machine server, and then the bastion machine server sends the corresponding fingerprint feature code file to the client.
The third module 303 logs in the current fingerprint information, and determines whether to allow login by comparing the current fingerprint information with the fingerprint feature code file corresponding to the user.
For example, when a user logs in through fingerprint authentication, the client calls a fingerprint tool program authentication module to log in current fingerprint information, compares the current fingerprint information with a fingerprint feature code file issued by a server to obtain a comparison result, and then judges whether to allow login according to the comparison result.
In some embodiments, the third module 303 is configured to: if the current fingerprint information is matched with the fingerprint feature code file corresponding to the user, allowing login; and if the current fingerprint information is not matched with the fingerprint feature code file corresponding to the user, not allowing login. And judging whether login is allowed or not according to the comparison result of the current fingerprint information and the fingerprint feature code file corresponding to the user, thereby effectively realizing fingerprint login based on the bastion machine.
In some embodiments, the third module 303 is further configured to: if the current fingerprint information is matched with the fingerprint feature code file corresponding to the user, login is allowed, and prompt information about successful login is sent to the user; and if the current fingerprint information is not matched with the fingerprint feature code file corresponding to the user, not allowing login, and sending prompt information about login failure to the user. And judging whether login is allowed or not according to the comparison result of the current fingerprint information and the fingerprint feature code file corresponding to the user, and sending prompt information about whether login is successful or not to the user, so that better fingerprint login experience is provided for the user.
To sum up, the embodiment of the application provides a fingerprint login method based on a bastion machine, which can avoid potential leakage and intrusion risks caused by a password login mode, reduce complex work of a system setting layer, and meanwhile, can be conveniently deployed, implemented and operated by taking human body characteristics as a carrier, and is convenient for a user to operate and use. The embodiment of the application is applied to the operation and maintenance management system, and the applicability, the practicability, the safety and the flexibility of the system can be improved.
In addition, some of the present application may be implemented as a computer program product, such as computer program instructions, which when executed by a computer, may invoke or provide methods and/or techniques in accordance with the present application through the operation of the computer. Program instructions which invoke the methods of the present application may be stored on a fixed or removable recording medium and/or transmitted via a data stream on a broadcast or other signal-bearing medium and/or stored within a working memory of a computer device operating in accordance with the program instructions. Herein, some embodiments of the present application provide a computing device comprising a memory for storing computer program instructions and a processor for executing the computer program instructions, wherein the computer program instructions, when executed by the processor, trigger the device to perform the methods and/or aspects of the embodiments of the present application as described above.
Furthermore, some embodiments of the present application also provide a computer readable medium, on which computer program instructions are stored, the computer readable instructions being executable by a processor to implement the methods and/or aspects of the foregoing embodiments of the present application.
It should be noted that the present application may be implemented in software and/or a combination of software and hardware, for example, implemented using Application Specific Integrated Circuits (ASICs), general purpose computers or any other similar hardware devices. In some embodiments, the software programs of the present application may be executed by a processor to implement the steps or functions described above. Likewise, the software programs (including associated data structures) of the present application may be stored in a computer readable recording medium, such as RAM memory, magnetic or optical drive or diskette and the like. Additionally, some of the steps or functions of the present application may be implemented in hardware, for example, as circuitry that cooperates with the processor to perform various steps or functions.
It will be evident to those skilled in the art that the present application is not limited to the details of the foregoing illustrative embodiments, and that the present application may be embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the application being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned. Furthermore, it is obvious that the word "comprising" does not exclude other elements or steps, and the singular does not exclude the plural. A plurality of units or means recited in the apparatus claims may also be implemented by one unit or means in software or hardware. The terms first, second, etc. are used to denote names, but not any particular order.

Claims (10)

1. A fingerprint login method based on a bastion machine, wherein the method comprises the following steps:
recording fingerprint information of a user, generating a corresponding fingerprint feature code file based on the fingerprint information, and uploading the fingerprint feature code file to a bastion machine server;
based on the login request command of the user, requesting a fingerprint feature code file corresponding to the user from the bastion machine server to obtain the fingerprint feature code file corresponding to the user;
and recording the current fingerprint information, and judging whether login is allowed or not by comparing the current fingerprint information with the fingerprint feature code file corresponding to the user.
2. The method of claim 1, wherein the method further comprises:
before the fingerprint information of the user is recorded, a management password is distributed through a login interface;
and if the user passes the verification based on the management password, entering an account registration binding page.
3. The method of claim 2, wherein the logging of fingerprint information of the user comprises:
and after entering the account registration binding page, calling a fingerprint tool program to record the fingerprint information of the user.
4. The method of any one of claims 1 to 3, wherein determining whether to allow login by comparing the current fingerprint information with a fingerprint signature file corresponding to the user comprises:
if the current fingerprint information is matched with the fingerprint feature code file corresponding to the user, allowing login;
and if the current fingerprint information is not matched with the fingerprint feature code file corresponding to the user, not allowing login.
5. The method of claim 4, wherein determining whether to allow login by comparing the current fingerprint information with a fingerprint signature file corresponding to the user further comprises:
if the current fingerprint information is matched with the fingerprint feature code file corresponding to the user, login is allowed, and prompt information about successful login is sent to the user;
and if the current fingerprint information is not matched with the fingerprint feature code file corresponding to the user, not allowing login, and sending prompt information about login failure to the user.
6. A fingerprint login method based on a bastion machine, wherein the method comprises the following steps:
recording fingerprint information of a user at a client, generating a corresponding fingerprint feature code file based on the fingerprint information, and uploading the fingerprint feature code file to a bastion server;
the bastion machine server establishes the association relationship between the fingerprint feature code file and the user and stores the fingerprint feature code file;
the client requests the fingerprint feature code file corresponding to the user from the bastion machine server based on the login request command of the user;
the bastion machine server issues a fingerprint feature code file corresponding to the user to the client;
and recording current fingerprint information at the client, and judging whether login is allowed or not by comparing the current fingerprint information with the fingerprint feature code file corresponding to the user.
7. The method of claim 6, wherein the method further comprises:
before the client logs in the fingerprint information of the user, a management password is distributed through a login interface;
and if the user passes the verification based on the management password, the client enters an account registration binding page.
8. A bastion machine based fingerprint login device, wherein the device comprises:
the system comprises a first module, a second module and a third module, wherein the first module is used for recording fingerprint information of a user, generating a corresponding fingerprint feature code file based on the fingerprint information and uploading the fingerprint feature code file to a bastion machine server;
the second module is used for requesting the fingerprint feature code file corresponding to the user from the bastion machine server based on the login request command of the user and acquiring the fingerprint feature code file corresponding to the user;
and the third module is used for recording the current fingerprint information and judging whether login is allowed or not by comparing the current fingerprint information with the fingerprint feature code file corresponding to the user.
9. A computing device, wherein the device comprises a memory for storing computer program instructions and a processor for executing the computer program instructions, wherein the computer program instructions, when executed by the processor, trigger the device to perform the method of any of claims 1 to 7.
10. A computer readable medium having stored thereon computer program instructions executable by a processor to implement the method of any one of claims 1 to 7.
CN202110584273.5A 2021-05-27 2021-05-27 Fingerprint login method and device based on bastion machine Pending CN113190820A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110584273.5A CN113190820A (en) 2021-05-27 2021-05-27 Fingerprint login method and device based on bastion machine

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110584273.5A CN113190820A (en) 2021-05-27 2021-05-27 Fingerprint login method and device based on bastion machine

Publications (1)

Publication Number Publication Date
CN113190820A true CN113190820A (en) 2021-07-30

Family

ID=76985387

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110584273.5A Pending CN113190820A (en) 2021-05-27 2021-05-27 Fingerprint login method and device based on bastion machine

Country Status (1)

Country Link
CN (1) CN113190820A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114238800A (en) * 2021-12-07 2022-03-25 中信银行股份有限公司 Automatic query method, device, equipment and readable storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103873446A (en) * 2012-12-17 2014-06-18 中航物联技术(北京)有限公司 Method for logging in system
CN109672695A (en) * 2019-03-01 2019-04-23 浙江齐治科技股份有限公司 A kind of double factor identity identifying method and device
CN110717170A (en) * 2019-10-09 2020-01-21 重庆市筑智建信息技术有限公司 BIM system fingerprint login system, method and device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103873446A (en) * 2012-12-17 2014-06-18 中航物联技术(北京)有限公司 Method for logging in system
CN109672695A (en) * 2019-03-01 2019-04-23 浙江齐治科技股份有限公司 A kind of double factor identity identifying method and device
CN110717170A (en) * 2019-10-09 2020-01-21 重庆市筑智建信息技术有限公司 BIM system fingerprint login system, method and device

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114238800A (en) * 2021-12-07 2022-03-25 中信银行股份有限公司 Automatic query method, device, equipment and readable storage medium

Similar Documents

Publication Publication Date Title
CN110414268B (en) Access control method, device, equipment and storage medium
US10021108B2 (en) Anomaly detection for access control events
US10834086B1 (en) Hybrid cloud-based authentication for flash storage array access
US20180013747A1 (en) Controlling Access to Resources on a Network
US9313230B1 (en) Policy approval layer
EP4161012A1 (en) Authentication method and apparatus, electronic device, server, program, and storage medium
US20080066165A1 (en) Method, system and program product for authenticating a user seeking to perform an electronic service request
US9934310B2 (en) Determining repeat website users via browser uniqueness tracking
KR20220160021A (en) Low Trust Privilege Access Management
US9509672B1 (en) Providing seamless and automatic access to shared accounts
CN110324416B (en) Download path tracking method, device, server, terminal and medium
US20220188437A1 (en) Data Access Monitoring and Control
US20150020167A1 (en) System and method for managing files
CN110944021A (en) Method and system for campus unified authentication and single sign-on
CN109635529A (en) Account shares detection method, device, medium and electronic equipment
CN112395591A (en) Encryption method and system
CN115118434A (en) Blockchain-based key management method and device
CN101702724A (en) Security control method and device for network access
CN109726187B (en) A Hadoop-oriented adaptive permission control method and device
CN113190820A (en) Fingerprint login method and device based on bastion machine
CN116107781A (en) Log tracking method, device, electronic equipment and computer program product
US20250103441A1 (en) Determining risks in data backups
CN111291393A (en) Request checking method and device
CN116781392A (en) Login method, device, system and equipment
US11741213B2 (en) Systems for enhanced bilateral machine security

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20210730