Method and system for protecting account, preventing order from being tampered and preventing fishing attack based on graphical two-dimensional code

A phishing attack and two-dimensional code technology, which is applied in the field of network communication, can solve the problems of easy phishing attack, phishing, tampering, etc., and achieve the effect of strong practical value, strong practical significance, and improved network security

Inactive Publication Date: 2012-07-11
TIMESAFER BEIJING TECH
View PDF5 Cites 48 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, most Internet applications adopt the traditional user name plus static password authentication method. The account information in this way is very easy to be stolen, and the corresponding user order information is also easy to be tampered with. At the same time, the authentication method based on user name and static password It is easy to be attacked by phishing. If the dynamic password method is used, there is also the risk of being phished
At present, the various methods adopted to prevent phishing attacks, prevent order tampering, and prevent account theft have obvious technical deficiencies

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for protecting account, preventing order from being tampered and preventing fishing attack based on graphical two-dimensional code
  • Method and system for protecting account, preventing order from being tampered and preventing fishing attack based on graphical two-dimensional code
  • Method and system for protecting account, preventing order from being tampered and preventing fishing attack based on graphical two-dimensional code

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] The present invention will be described in detail below in conjunction with the accompanying drawings and embodiments. The working principle of a method for protecting accounts based on graphic two-dimensional codes and preventing order tampering and phishing attacks in the present invention is as follows: figure 1 as shown,

[0032] The PC client 2 accesses the application server 3 through a browser, and has a container for displaying a graphic two-dimensional code;

[0033] The application server 3 can distribute static account numbers, graphic two-dimensional code algorithm generation and decoders;

[0034] The authentication system server 4 provides support services for the account bound to the application server 3 based on the client of the mobile terminal 1, and it can distribute unique identifiers and perform identity authentication for accounts registered on the application server 3;

[0035] The client installed on the mobile terminal 1 can obtain the graphic...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and a system for protecting an account, preventing an order from being tampered and preventing a fishing attack based on a graphical two-dimensional code. Double-link data is used for authentication; and two links comprises a first link for authentication from a personal computer (PC) client to a user name and a static password of an application server, and a second link for authentication through an authentication service from the client based on a mobile terminal to the application server. The system comprises the mobile terminal, the PC client, the application server, an authentication system server and an authentication system disaster backup server. The invention has the advantages that: authentication is performed on the application server by being combined with the graphical two-dimensional code information of the mobile terminal and the application server according to the double-link data of information transmitted between the application server and the mobile terminal, so that a brand new effective solution is provided for preventing the fishing attack, preventing the order from being tampered and preventing a number from being stolen; the network security is improved greatly; and the invention has relatively high practical value and practical significance.

Description

technical field [0001] The invention relates to a method and system for protecting accounts based on graphic two-dimensional codes, preventing order tampering and phishing attacks, and belongs to the technical field of network communication. Background technique [0002] With the rapid development of information technology, especially the maturity of wireless communication and network communication technology, more and more enterprises have changed the previous way of operating business systems in isolation on the internal LAN of the enterprise and put them on the Internet. Internet applications have made great strides. However, the resulting problems of information sharing and information protection have become increasingly prominent, and network security and crime have restricted the prospect of Internet applications for a long time to a certain extent. Common network security issues include tampering with user order information, stealing accounts, and phishing attacks. A...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08H04L9/32G06K19/06
Inventor 郭泽文王黎明陈易左飞李涛周小猛
Owner TIMESAFER BEIJING TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products