Unlock instant, AI-driven research and patent intelligence for your innovation.

Safety authentication method and system

A technology of security authentication and security detection, which is applied in the field of network security to achieve the effect of ensuring security

Active Publication Date: 2013-11-06
INDUSTRIAL AND COMMERCIAL BANK OF CHINA
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] For example, one of the more commonly used methods is that the server uses the session method to maintain the state with the client, and saves a session ID in each page. If a hacker gets the session ID, he can use the current session of the client to pretend to be the client to submit a request. (At this time, the system will not judge it as concurrent login control, because the hacker uses the session ID of the customer login, not the new sessionID generated by the new login), so when the customer performs online operations, there is a great risk

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety authentication method and system
  • Safety authentication method and system
  • Safety authentication method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] In order to make the objectives, technical solutions and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with examples and with reference to the accompanying drawings.

[0021] Generally, a user connects to a server through a client device such as a PC, a mobile phone, or a PDA through the Internet or a local area network to obtain various services, such as sending emails, accessing databases, downloading data, or browsing online. However, many services require safety authentication for users. According to the safety authentication mechanism of the present invention, a safety detection device needs to be installed in the client device, and the safety detection device can be implemented by computer software. The implementation principle is to bind a specific client to a server, so that when the server provides a certain service to the user, the server uniquely identifies the client through the client...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a safety authentication method and a system. The method comprises the following steps that: a user submits a bonding establishing request to a server through a client; the server downloads a safety detection device and a generated first random number for the client; the safety detection device generates computer fingerprint information and a computer mark by utilizing the hardware information of the client and uploads the encrypted computer fingerprint information, the computer mark and a random number to the server; the server deciphers ciphertext to acquire the random number; if the random number is equal to the first random number, the computer fingerprint information and the computer mark are registered; otherwise, bonding failure information is returned; when the server provides the service to the client each time, the bonding is checked. By utilizing the technical scheme of the invention, the client is identified by using the computer hardware information in the safety authentication process, and thereby, a network is ensured to uniquely identify client equipment so that the safety of the network communication is improved.

Description

Technical field [0001] The present invention relates to network security technology, in particular to a method and system for performing security authentication on a client. Background technique [0002] With the widespread use of Internet technology, network security issues have become an important factor that plagues network development. The hidden dangers of network security are mainly manifested in the following three aspects: viruses, illegal operations by internal users and hacker attacks outside the network. Illegal operations by internal users include malicious and non-malicious operations: one is due to the lack of rigor of network settings, and internal users of the network mistakenly enter areas that they should not enter and mistakenly modify the data; the other is some internal The user deliberately destroys data by using his legal identity. Hacking attacks are the most terrible. Once a network hacker enters a network, the damage it causes is immeasurable. [0003] ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32H04L9/30
Inventor 彭琳潘葛桐赵爱新张洋
Owner INDUSTRIAL AND COMMERCIAL BANK OF CHINA