Method for protecting account number safety

A technology of account security and account, which is applied in radio/inductive link selection arrangement, special data processing application, user identity/authority verification, etc., can solve the problems of easy loss, high cost of use, low reliability, etc., and achieve authentication strength Enhanced, easy to use, high preventive effect

Inactive Publication Date: 2008-09-03
陈珂
View PDF0 Cites 51 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since the password changes dynamically with time, it is impossible for anyone without a password card to know the password. Therefore, this password technology is much safer than the static password. , easy to carry, the defects of this technology: high cost of use, easy to lose, easy to damage, low reliability, password generation depends entirely on time synchronization, if the time difference between the client and server is large, the password card will fail and cause The user cannot log in to the system
It has a common shortcoming with the second technology that it cannot prevent new types of Trojan horses (the characteristics of this Trojan horse are: when the user logs in, the client is disconnected, or the login b

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for protecting account number safety

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0034] Embodiment 1, static password plus mobile phone short message to transmit two groups of dynamic verification codes two authentication methods

[0035] The user needs to submit the user's account name and mobile phone number to the registration authentication server system, and the system binds the user's account name and mobile phone number to each other, and agrees an activation code (account or agreed activation instruction) bound to the mobile phone number; login required When the user submits his activation code to the system SMS platform through the SMS gateway in the form of a mobile phone short message; the system short message platform extracts the activation code and the user's mobile phone number in the user's short message after receiving the user's login request, and transfers it to the system for authentication After receiving the activation code, the authentication server retrieves it in the database of the system authentication server. If the activation co...

Example Embodiment

[0036] Embodiment 2, static password, dynamic password card plus mobile phone short message transmission dynamic password twice authentication method

[0037] The user needs to submit the user's account name or mobile phone number to the registration and authentication server system, and the system binds the user's account and mobile phone number to each other, and agrees an activation code (account or agreed activation instruction) bound to the mobile phone number to obtain the service. The dynamic password card provided by the provider is bound to the user's account; when the user needs to log in, the user submits his activation code to the system SMS platform through the SMS gateway through the SMS gateway; the system SMS platform extracts the user's SMS after receiving the user's login request. The activation code and the user's mobile phone number in the system authentication server will be forwarded to the system authentication server. After receiving the account number a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method for protecting the account number cryptographic security, wherein the system reliability is high, the transferring secret degree of the dynamic cipher information is high, which is not afraid of declassification and watching stealthily, meanwhile can effectively keep away the attack of cockhorse viral with low cost. The method includes the following steps: (1) registering; (2) entry request; (3) sever authentication; (4) transmitting the dynamic cipher; (5) user's entry; (6) sever authentication, which is characterized in that the steps of (5) and (6) need to be executed for two times respectively, and the ciphers for entry for two times are both dynamic ciphers. The account number and the dynamic cipher A are input in the first entry, the dynamic cipher A is out of work immediately after passing by the authentication, then the dynamic cipher B is input for the next entry, the dynamic cipher B is out of work immediately after the successful entry.

Description

(1) Technical field [0001] The invention relates to the operation and application technology combining short message transmission and computer database, in particular to a method for protecting account security. (2) Background technology [0002] At present, there are mainly four methods of public account protection as follows: [0003] The first is the static password authentication technology, which uses the user's "account name" and "password" to authenticate and identify the legitimacy of the user. Its main feature is to use a fixed password to activate a specific account, but due to the password and As a soft identifier, the account number is static and unchanged, and it is transmitted in the network. There are many disadvantages and security holes. The cracking technology for it is constantly developing, and many tools and methods can be used to steal account passwords, such as stealing, deciphering, etc. , Peeping, cheating, etc. In addition, there are high requireme...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/32H04Q7/22G06F17/30
Inventor 陈珂
Owner 陈珂
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products