Password authentication method in network application and system

A password verification and network application technology, applied in transmission systems, digital data authentication, instruments, etc., can solve problems such as user passwords being cracked, network application security reduction, password brute force cracking, etc., and achieve extraction security and brute force cracking Possibility reduction and safety improvement effect

Inactive Publication Date: 2012-01-11
李建成
View PDF4 Cites 25 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, due to the complexity of the network environment, user passwords are often cracked, which greatly reduces the security of network applications.
[0004] When the user enters passwords and account numbers on the client side, the client side encrypts the input information and reports it to the server side, and the server side decrypts and verifies the received input information, but often passes the input information on the client side In the process of reaching the server, it is convenient for malicious software to intercept the user's input information, and then make the encrypted password cracked by violence

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Password authentication method in network application and system
  • Password authentication method in network application and system
  • Password authentication method in network application and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0057] figure 1 It shows a password verification method in a network application in an embodiment, including the following steps:

[0058] Step S110, obtaining a random character string according to the triggered login event.

[0059] In this embodiment, the user enters the user ID and the corresponding password in the interactive interface of the network application, and clicks the "login" button, which triggers the login event. At this point, get a random string based on this triggered login event. Random character strings are randomly generated through random functions, etc., and the random character strings obtained by users every time they log in are different.

[0060] Step S130, acquiring the password and user ID input by the user.

[0061] In step S150, the password input by the user and the random character string are combined to form verification information.

[0062] In this embodiment, the more digits of the password, the higher the security of the password may...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a password authentication method in network application and a system. The method comprises the following steps that: a random character string is obtained according to a triggered login event; a password input by a user and user identification are obtained; the password input by the user and the random character string form authentication information; the authentication information is encrypted, and the user identification and the encrypted authentication information are transmitted to a server; and the server authenticates the user identification and the encrypted authentication information. In the password authentication method and the system, disclosed by the invention, since the password input by the user and the obtained random character string form the authentication information and the encrypted authentication information is transmitted to the server, the security during password authentication is improved and the situation that the authentication information is intercepted by malicious software during transmission is avoided; and since the random character string is added into the authentication information and the encryption is conducted, the probability that the authentication information is cracked violently is greatly reduced.

Description

【Technical field】 [0001] The invention relates to the field of information security, in particular to a password verification method and system in network applications. 【Background technique】 [0002] With the development of computer network applications, there are more and more network applications such as online games, virtual communities, and online transactions. At the same time, the security problems of these network applications are becoming increasingly prominent. [0003] In most network applications, the user uses the application program provided by the server through the client, and the server usually requires the user to enter the corresponding password and account information, and can only enter the corresponding application program after verification, so as to prevent illegal users from entering. However, due to the complexity of the network environment, user passwords are often cracked, which greatly reduces the security of network applications. [0004] When ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06F21/00G06F21/30
Inventor 李建成
Owner 李建成
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products