Unlock instant, AI-driven research and patent intelligence for your innovation.

Internet safety identification method

A security authentication and Internet technology, applied in the field of Internet security authentication, to achieve the effect of improving security

Inactive Publication Date: 2008-07-09
任少华
View PDF1 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In this case, the user's login cost can only be borne by online resources, which leads to the possibility of malicious login attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Internet safety identification method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] Fig. 1 is a step diagram of an embodiment of the present invention, wherein, the user's first application object is a user network terminal, and the user's second application object is a mobile terminal or an instant messaging terminal, and the steps are:

[0027] 1) The user network terminal requests access to the system;

[0028] 2) The system generates a random symbol sequence as authentication information;

[0029] 3) The system sends the authentication information to the user's network terminal;

[0030] 4) The user sends the authentication information to the system through a mobile terminal or a network instant messaging terminal;

[0031] 5) The system checks whether the received authentication information is consistent with the authentication information generated by itself, and if they are consistent, the authentication is passed.

[0032] Between step 2) and step 3) of this embodiment may also include: the system generates a time stamp, and step 5) is perfor...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention adopts a method for the internet security authentication and prevents the problem of malicious outbreak login attack by that the authentication cost is shared by users as well as providing secure internet authentication. The existing technical proposal is that a system sends authentication information to a second application terminal of the users, while the invention adopts an opposite process in a way of sending the authentication information to the system by a second application object of the users and solves the defects of the existing technical proposal while carrying out the security authentication; the users share the login cost, thus preventing the malicious outbreak login attack; at the same time, the invention can also adopt the way that firstly the authentication information is sent to the second application object and secondly the authentication information is responded and returned by the second application object of the users and the security can be improved in some application situations.

Description

technical field [0001] The invention relates to an Internet security authentication method. Background technique [0002] The number of resources and services based on the Internet is huge and growing rapidly. The Internet has become the main channel for people to obtain information resources and information services. Not many online applications are needed. Some resources and services that are important to users, such as online game accounts, e-commerce accounts, etc., often face the problem of insufficient online security. [0003] There are already some related solutions, among which the patent "Internet security authentication method" (application number: 200410091743.0) is very feasible and convenient. The method is: when the user requests authentication from the network terminal, the authentication information is sent to the user's Other terminals are returned by the network terminal. For example: when a user requests to log in to a certain network resource, the net...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/16
Inventor 任少华
Owner 任少华