A Method of Ensuring the Security of Client Software

A client-side software and security technology, applied in electrical components, user identity/authority verification, transmission systems, etc., can solve problems such as the inability to guarantee communication security, and achieve communication security, prevent replay attacks, and prevent tampering Effect

Inactive Publication Date: 2011-12-28
北京无限新锐网络科技有限公司
View PDF5 Cites 28 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, asymmetric encryption requires the use of public and private keys for communication. How to ensure that the private key is safely delivered to the terminal without being stolen is the guarantee of secure communication, because once the private key is stolen, it means that hackers can counterfeit The communication between the terminal and the server cannot guarantee the security of the communication.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Method of Ensuring the Security of Client Software
  • A Method of Ensuring the Security of Client Software
  • A Method of Ensuring the Security of Client Software

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] The principles and features of the present invention are described below in conjunction with the accompanying drawings, and the examples given are only used to explain the present invention, and are not intended to limit the scope of the present invention.

[0050] Such as figure 1 As shown, the present invention guarantees the method for client software safety, and concrete steps are as follows:

[0051]Step 1, the terminal downloads the client software from the server, and the server adds terminal identity authentication information to the client software package;

[0052] Step 2, the terminal sends a binding request to the server;

[0053] Step 3: The server verifies the legitimacy of the binding request sent by the terminal: if it is legal, the terminal and the client software complete the binding on the server, and the server sends the message that the binding is successful to the terminal, and then executes step 4; otherwise, the server sends a message to the ter...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for ensuring the security of client software. The method comprises the following steps of: 1, downloading the software by using a terminal, and adding terminal identity authentication information into a software packet by using a server; 2, transmitting a binding request to the server by using the terminal; 3, verifying the legality of the binding request, and if the binding request is legal, transmitting a binding success information to the terminal; 4, verifying the legality of the binding success information; 5, transmitting a login request to the server by using the terminal; 6, verifying the legality of the login request, and if the login request is legal, transmitting a login success information to the terminal; and 7, verifying the legality of the login success information, and if the login success information is legal, keeping a session. By the method, the software can be better prevented from being falsified; the security of communication between the terminal and the server can be ensured; replay attacks can be effectively prevented; the software can be detected whether to be falsified or not; and even though a hacker downloads the software and attacks the server by falsifying the software, only the terminal cannot be used normally and the normal use of other users may not be influenced.

Description

technical field [0001] The invention relates to a method for ensuring the safety of client software. Background technique [0002] When the user downloads the required client software from the server through the handheld terminal, there may be the following security risks: [0003] The software is maliciously tampered with: Since most terminals are developed for java, the characteristics of the java language make it easy for the code to be decompiled and tampered with. Although the code obfuscation technology is used, the hacker can slightly improve the decompilation program, and still be able to decompile the client software, so the effect is not ideal. [0004] Customer identity protection and verification: The usual identity verification is only based on the form of user name and password. However, user name and password are transmitted on the network and are easy to be stolen by hackers. The existing technology can use RSA and other encryption technologies to prevent t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
Inventor 林镇武林荣龙翚
Owner 北京无限新锐网络科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products