Method for landing by account number cipher for protecting network application sequence
An account and password technology, applied in the field of Internet application information security processing, can solve problems such as inability to prevent virus and Trojan horse theft, increase network burden, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0020] A method for protecting network applications using account passwords to log in. The client password is input, and then the server-side authentication is used to log in. The client is provided with a universal keyboard driver, and the keyboard driver is preset with an encrypted private key and Private key encryption module; at the same time, the server is also provided with an encryption private key and encryption module, which are consistent with the private key and private key encryption module used by the client.
[0021] The specific steps of use are as follows:
[0022] A. The client initiates a connection request to the server, the server generates a random number after receiving the connection request, the server keeps a record of the generated random number, and sends the random number to the client through the network connection;
[0023] B. After receiving and recording the random number returned by the server, the client activates the keyboard driver and accep...
Embodiment 2
[0028] A method for protecting network applications using account passwords to log in. The client activates the encryption function of the keyboard driver through the device driver's interactive interface DeviceIoControl. The key and private key encryption module encrypts the input account password, puts the encrypted account password in the application layer of the operating system, and the client gets the encrypted information of the user input password. The algorithm of the private key encryption module adopts Data Encryption Standard (DataEncryptoin Standard, DES).
Embodiment 3
[0030] A method for protecting a network application program using an account password to log in. A client performs information digest encryption on combined data using an irreversible Safe Hash Algorithm (Safe Hash Algorithm, SHA). The client performs information digest encryption on the combined data of the user account and the encrypted user password of the keyboard driver + the random number received from the server, and encapsulates the information digest data of SHA (Account) and SHA (Password+RandomWord) into a login The data packet is sent to the server for verification.
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 