Login protection method

A technology for login interface and login information, which is applied in the fields of computer software, network communication and information security, and can solve the problems of accurate judgment, inability to solve the hidden worries of eavesdropping on the keyboard and peeping at the screen, and upgrading the operating system version.

Inactive Publication Date: 2009-05-27
杨筑平
View PDF4 Cites 25 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method is relatively complicated, and it will be very difficult to make an accurate judgment. Moreover, if the system kernel is touched, there is also a risk of stability, not to mention the variable of the operating system version upgrade.
It thinks that intercepting the sending of WM_GETTEXT messages is sufficient to prevent the theft of text information, but it is not enough; moreover, it cannot solve the hidden worries of eavesdropping on keyboards and peeping screens
To sum up, the existing technical methods still have certain limitations in preventing the user's account information from being stolen during the login process.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Login protection method
  • Login protection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0016] Set the target operating environment as Microsoft's Windows operating system, using the Visual Studio.Net integrated development platform.

[0017] 1. Implementation of hook protection.

[0018] Develop a Visual C++ type MFC dynamic link library (DLL) project, only create an empty callback function LRESULT CALLBACK RecoveryCallWndProc(int nCode, WPARAM wParam, LPARAM lParam){

[0019] / / return CallNextHookEx();

[0020] return NULL;

[0021]}

[0022] As a defensive hook program, the code in it is only executed to return a value of 0, but not to return the API function call CallNextHookEx(), which intentionally deprives subsequent hooks of running opportunities. The DLL project is compiled to generate the recovery.dll file. For the login program to be protected, obtain its window pointer hWnd, and then call the API function to obtain and save the identity of its belonging thread

[0023] dwWinThreadID = GetWindowThreadProcessId(hWnd, NULL);

[0024] Periodi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a log-in protection method, which relates to the technical field of computer software, software communication and information security. at the outside of an object log-in interface, an agent is used to acquire user log-in information, at least password item in user log-in information is subjected to encryption conversion; when the actual operation of the user directs to the position of a subwindow to be sent on the object log-in interface, and user log-in information is sent to the object log-in interface by the window information span thread; the method actively and dynamically controls and installs a defense hook program for the window attribution thread; due to competition, the window attribution thread is positioned on the chain head of the hook and is privileged to be called for execution, the defense hook program is directly returned to shield the following hooks in the end so as to avoid the malicious interception of information related to window process. The method realizes the concurrent operation of common software products, network service systems and agent independent from the object application program, is widely applied to E-mail boxes, network banks, business affairs, government affairs, communication, game and information systems with required user log-in, and can effectively protect user accounts from embezzlement.

Description

technical field [0001] The invention relates to the technical fields of computer software, network communication and information security. Background technique [0002] Login is the only way for users to enter and use the application system. On the login interface, the user enters login information (mainly account information, including user name / account number, password, and possibly auxiliary information such as verification code), and accepts system verification after confirmation. In the network environment, especially on the Internet, all kinds of spy programs (programs that steal user information, such as Trojan horse programs, etc.) are rampant, but they are very secretive and hard to find. They often steal account information and infringe users without knowing it. User Privacy and Property. This has become a major public hazard in the network society, greatly endangering the normal order of various applications such as e-mail, online banking, e-commerce, e-governme...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/00H04L9/32G06F21/52
Inventor 杨筑平周跃平杨霄
Owner 杨筑平
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products