Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Implementation method for safety link of internet lottery ticket system based on public key

A public key, system security technology, applied in transmission systems, electrical components, marketing, etc., can solve the problems of user personal information to ensure high-level business security, inability to prevent intrusive operations, and inability to prevent misappropriation of distributed denial of service attacks. , to achieve the effect of strengthening safety certification, ensuring reliability and stability

Active Publication Date: 2014-09-03
JIANGSU XINCAI SOFTWARE
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006](1) Cannot prevent Distributed Denial of service (distributed denial of service attack) after stealing public key certificate
[0007] cannot prevent intrusive operations initiated by hotlinking technology after stealing public key certificates
[0008] Unable to combine the user's network environment for identification
[0009] cannot combine user personal information to ensure high-level business security
[0010] Cannot combine historical login and current operation time for time axis operation security screening

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Implementation method for safety link of internet lottery ticket system based on public key

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach

[0025] Such as figure 1 As shown, a method for implementing a public key-based Internet lottery system security link, the specific implementation steps are as follows:

[0026] (1) Combination of public key, private key, security certificate and user identity system generated by independent authentication and authorization methods;

[0027] (2) HTTPS protocol processing of self-authentication credentials, before the TLS link is established, use the user identity system and dynamic link vector to perform identity authentication and link authentication;

[0028] (3) At the initial stage of the session, check whether the authentication vector comes from the authorized network, and then check whether the user identity system is a subscriber. At the initial stage of the session, check whether the authentication vector comes from the authorized network, and then check whether the user identity system is a subscriber. If not, then The web browser jumps to the registrati...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention disclosed a security link implementation method based on the public key, involving the technology field of Internet lottery sales systems.This method passes the verified dynamic link vector records and user identity system under the route vector protocol, and strengthen the link -level security certification, so as to buy personal identity information, link vector information and authentication strategy when using the portal website to buy lottery.Combined to ensure the reliability and stability of users' daily businesses in the process of network transmission in the process of network transmission.Advantages: When using the portal website to buy lottery, combine personal identity information, link vector information and verification strategies to ensure the reliability and stability of users' security mechanisms in the network transmission process of lottery purchase and payment.sex.

Description

technical field [0001] The invention relates to the technical field of Internet lottery sales systems, in particular to an Internet lottery ticket based on a public key [0002] A method for implementing a secure link in a network lottery system. Background technique [0003] HTTP is an object-oriented protocol belonging to the application layer. It is suitable for distributed hypermedia information systems due to its simple and fast method. It was proposed in 1990, and after several years of use and development, it has been continuously improved and expanded. The sixth edition of HTTP / 1.0 is currently used in the WWW. The standardization of HTTP / 1.1 is in progress, and the proposal of HTTP-NG (Next Generation of HTTP) has been proposed. The HTTP protocol is based on the request / response paradigm. After a client establishes a connection with the server, it sends a request to the server. The format of the request is Uniform Resource Identifier, protocol version number, fo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08G06Q30/02
Inventor 耿喆刘洪马吴仲喜刘峰王学奎黄海波
Owner JIANGSU XINCAI SOFTWARE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products