Method for landing by account number cipher for protecting network application sequence

A network application program and account technology, applied in the direction of user identity/authority verification, etc., can solve the problems of increasing network burden, unable to prevent virus and Trojan horse stealing behavior, etc.

Active Publication Date: 2007-10-10
成都金山互动娱乐科技有限公司
View PDF1 Cites 31 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

SSL is a secure network communication protocol that uses a combination of public key and private key technology. The deployment of SSL requires very high performance requirements for the server hardware of the Web system. The process of initializing the SSL session and connection status information between the server and the client requires processing complex handshakes. Protocol, adding additional network burden, users will also have obvious waiting time during use
In addition, the Chinese invention patent application with the patent application number 03148856.0 provides a method for user identity authentication using one-time random numbers, using the MD5 information digest algorithm to treat authentication data (account number, password or a combination of both) and random numbers The original information is encrypted and then sent to the server for verification, but this method can only protect the transmission of account password data, and cannot prevent viruses and Trojans from stealing accounts

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for landing by account number cipher for protecting network application sequence

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0020] A method for protecting network applications using account passwords to log in. The client password is input, and then the server-side authentication is used to log in. The client is provided with a universal keyboard driver, and the keyboard driver is preset with an encrypted private key and Private key encryption module; at the same time, the server is also provided with an encryption private key and encryption module, which are consistent with the private key and private key encryption module used by the client.

[0021] The specific steps of use are as follows:

[0022] A. The client initiates a connection request to the server, the server generates a random number after receiving the connection request, the server keeps a record of the generated random number, and sends the random number to the client through the network connection;

[0023] B. After receiving and recording the random number returned by the server, the client activates the keyboard driver and accep...

Embodiment 2

[0028] A method for protecting network applications using account passwords to log in. The client activates the encryption function of the keyboard driver through the device driver's interactive interface DeviceIoControl. The key and private key encryption module encrypts the input keyboard code, puts the encrypted keyboard code into the application layer of the operating system, and the client gets the encrypted information of the password entered by the user. The algorithm of the private key encryption module adopts Data Encryption Standard (Data EncryptoinStandard, DES).

Embodiment 3

[0030] A method for protecting a network application program using an account password to log in. A client performs information digest encryption on combined data using an irreversible Safe Hash Algorithm (Safe Hash Algorithm, SHA). The client performs information digest encryption on the combined data of user account and keyboard driver encrypted user password + random number received from the server, and encapsulates the information digest data of SHA (Account) and SHA (Password+RandomWord) into login data package, sent to the server for verification.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Through client end to input cipher, then the method carries out log on through authentication at server end. Characters are that universal keyboard drive program is setup at client end, encrypted private key and module for encrypting private key are preset inside the keyboard drive program; at same time, being identical to those setup at client end, the encrypted private key and module for encrypting private key are also setup at server end. The invention can prevent wooden horse virus process possessing function of recording keyboard and running at application layer on operation system from stealing account cipher input by user effectively as well as prevent network monitor tool (NMT) from intercepting log on data packet containing information of user account cipher etc, and prevent NMT implements chicaning log on through software method.

Description

technical field [0001] The invention relates to the field of Internet application information security processing, in particular to a method for protecting network application programs from logging in using account passwords. Background technique [0002] With the vigorous development of the Internet information industry, Internet-based applications are becoming more and more common, such as online games, instant chat software, online banking, etc., and account passwords are the identity verification methods used by most network applications at present; in order to seek illegal benefits In addition, lawbreakers can also use network monitoring tools to intercept network program login data packets and use software methods to implement fraudulent logins to servers, thus effectively protecting the network. The security of account passwords of application programs is an important topic in the development of Internet applications. [0003] To prevent the keylogging function from ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32
Inventor 周冠强
Owner 成都金山互动娱乐科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products