Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for protecting account number safety

A technology of account security and account, which is applied in radio/inductive link selection arrangement, special data processing application, user identity/authority verification, etc., can solve the problems of easy loss, high cost of use, low reliability, etc., and achieve authentication strength Enhanced, easy to use, high preventive effect

Inactive Publication Date: 2008-09-03
陈珂
View PDF0 Cites 51 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since the password changes dynamically with time, it is impossible for anyone without a password card to know the password. Therefore, this password technology is much safer than the static password. , easy to carry, the defects of this technology: high cost of use, easy to lose, easy to damage, low reliability, password generation depends entirely on time synchronization, if the time difference between the client and server is large, the password card will fail and cause The user cannot log in to the system
It has a common shortcoming with the second technology that it cannot prevent new types of Trojan horses (the characteristics of this Trojan horse are: when the user logs in, the client is disconnected, or the login box repeatedly appears to prevent the user from successfully logging in, and at the same time the user password is intercepted. And forward it to the email address designated by the Trojan horse broadcaster
) attack, because the attack method of this type of Trojan horse is to prevent the user from successfully logging in and intercepting the user's account number and password at the same time when the user logs in to the client, because the user has not completed the login on the client, so within a certain period of time The dynamic password sent by the password card or the mobile phone SMS will not change, once it is stolen at the same time as the static password, it still cannot fully protect the security of the account

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for protecting account number safety

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0034] Embodiment 1. Static password plus mobile phone SMS to send two sets of dynamic verification codes for two authentication methods

[0035] The user needs to submit the user's account name and mobile phone number to the registration authentication server system, and the system will bind the user's account name and mobile phone number to each other, and agree on the activation code (account or agreed activation command) bound to the mobile phone number; login is required At the same time, the user submits his activation code to the system SMS platform through the SMS gateway in the form of mobile phone text messages; the system SMS platform extracts the activation code and the user's mobile phone number from the user's SMS after receiving the user's login request, and transfers them to the system for authentication. After receiving the activation code, the authentication server retrieves it in the database of the system authentication server. If the activation code and mob...

Embodiment 2

[0036] Embodiment 2, static password, dynamic password card plus mobile phone short message transmission dynamic password twice authentication method

[0037] The user needs to submit the user's account name or mobile phone number to the registration authentication server system. The system binds the user's account and mobile phone number to each other, and agrees on the activation code (account number or agreed activation command) bound to the mobile phone number to obtain services. The dynamic password card provided by the provider is bound to the user's account; when the user needs to log in, the user submits his own activation code to the system SMS platform through the SMS gateway in the form of a mobile phone message; the system SMS platform extracts the user's message after receiving the user's login request The activation code and the user's mobile phone number in the system will be forwarded to the system authentication server. After receiving the account number and th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method for protecting the account number cryptographic security, wherein the system reliability is high, the transferring secret degree of the dynamic cipher information is high, which is not afraid of declassification and watching stealthily, meanwhile can effectively keep away the attack of cockhorse viral with low cost. The method includes the following steps: (1) registering; (2) entry request; (3) sever authentication; (4) transmitting the dynamic cipher; (5) user's entry; (6) sever authentication, which is characterized in that the steps of (5) and (6) need to be executed for two times respectively, and the ciphers for entry for two times are both dynamic ciphers. The account number and the dynamic cipher A are input in the first entry, the dynamic cipher A is out of work immediately after passing by the authentication, then the dynamic cipher B is input for the next entry, the dynamic cipher B is out of work immediately after the successful entry.

Description

(1) Technical field [0001] The invention relates to the operation and application technology combining short message transmission and computer database, in particular to a method for protecting account security. (2) Background technology [0002] At present, there are mainly four methods of public account protection as follows: [0003] The first is the static password authentication technology, which uses the user's "account name" and "password" to authenticate and identify the legitimacy of the user. Its main feature is to use a fixed password to activate a specific account, but due to the password and As a soft identifier, the account number is static and unchanged, and it is transmitted in the network. There are many disadvantages and security holes. The cracking technology for it is constantly developing, and many tools and methods can be used to steal account passwords, such as stealing, deciphering, etc. , Peeping, cheating, etc. In addition, there are high requireme...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/32H04Q7/22G06F17/30
Inventor 陈珂
Owner 陈珂
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products