Unlock instant, AI-driven research and patent intelligence for your innovation.

A network security verification system and its method

A network security and verification system technology, applied in transmission systems, digital transmission systems, secure communication devices, etc., can solve the problem of low security of authentication methods and achieve the effect of improving security

Inactive Publication Date: 2007-11-28
TENCENT TECH (SHENZHEN) CO LTD
View PDF0 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The technical problem to be solved by the present invention is to provide a network security verification system and method for the above-mentioned problem of low security of the authentication method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A network security verification system and its method
  • A network security verification system and its method
  • A network security verification system and its method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] As shown in FIG. 1 , it is a schematic structural diagram of a first embodiment of a network security verification system of the present invention. The system includes a region setting unit 11 and a region verification unit 12 . In this embodiment, the security verification system is located at the verification server 10 . In a specific application, the authentication server 10 is connected to the application server, and the application server is connected to the client through the network. Before the client enters the application server to execute a specific application, it must be authenticated by the authentication server. Of course, the application server and the verification server 10 may also be the same hardware device.

[0037] The region setting unit 11 is configured to set a region record including a corresponding relationship between a user account and a region. In this embodiment, the region setting unit 11 receives a setting request from a client, and cr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a testing system of network safety, which comprises the following parts: areal setting unit, which sets user account number and areal record corresponding to the area; areal testing unit, which acquires the area of customer end to judge whether the area of customer end mates the preset area; if mating, the system passes the testing; if not mating, the system displays failure testing. The invention also provides a testing method of network safety, which limits the landing area of user to inhibit partial ill behavior in the computer network system. The testing system can be combined with other testing systems, which improves the safety of computer network application.

Description

technical field [0001] The present invention relates to the technical field of network security, and more specifically, to a network security verification system and method. Background technique [0002] With the development of computer network applications, online games, virtual communities and online transactions are becoming more and more frequent. At the same time, the security issues of these network applications are becoming increasingly prominent. [0003] At present, the above-mentioned network application guarantees that the authentication method can only be used by the user himself mainly adopts the user login account and password method. After the login account and password entered by the user are verified by the server, they can enter the system. In addition, advanced encryption methods include variable encryption and the like. However, the above-mentioned authentication method is relatively simple and can be easily cracked by other malicious users (such as ha...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/00H04L9/32H04L29/06H04L12/28H04L12/24
Inventor 陈起儒龙一民
Owner TENCENT TECH (SHENZHEN) CO LTD