Account number single sign on protecting method and device

A single sign-on and protection device technology, applied in the transmission system, electrical components, etc., can solve the problems of stealing user virtual property and user loss, achieve the effect of protecting personal information and virtual property, and improving system security

Active Publication Date: 2014-03-26
TENCENT TECH (SHENZHEN) CO LTD
View PDF5 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Malicious programs can analyze the fast login protocol, and without the user's knowledge, simulate the user's quick login method through the webpage, making the server mistakenly believe that the user has logged in normally, thereby obtaining user information maliciously, stealing the user's virtual property, or Carry out some malicious promotion, causing losses to users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Account number single sign on protecting method and device
  • Account number single sign on protecting method and device
  • Account number single sign on protecting method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The solution of the embodiment of the present invention is mainly: through the URL (Uniform / Universal Resource Locator, Uniform / Universal Resource Locator) of the pre-established whitelist library and an authentication server to log in to the library, when a program not in the whitelist library accesses the URL of the authentication server When logging in to the URL contained in the library, the process is intercepted or the risk is prompted to the user, so as to protect the security of the single sign-on of the user account system.

[0025] Such as figure 1 As shown, the first embodiment of the present invention proposes an account single sign-on protection method, including:

[0026] Step S101, when the process starts, obtain the executable file information of the process;

[0027] In this embodiment, by means of injection, any account SSO process is injected to obtain the executable file information of the process, and the executable file information includes the na...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an account number single sign on protecting method and a device. The method comprises the steps of: obtaining executable file information of the progress when the progress is started; judging if executable files of the progress are in a prebuilt white list bank according to the executable file information; obtaining a target URL (Uniform Resource Locator) accessed by the progress when the executable files of the progress are not in the prebuilt white list bank; intercepting the progress and / or prompting the risk to users when the target URL belongs to a registration URL bank prebuilt in an authentication server. The account number single sign on protecting method and device can effectively intercept the behaviors of maliciously simulating the single sign on so as to protect personal information and virtual properties of the users, and can monitor special behaviors of some novel Trojan so as to improve the system safety.

Description

technical field [0001] The invention relates to the technical field of computer security, in particular to an account single sign-on protection method and device. Background technique [0002] In the single sign-on technology (Single Sign On), when the user accesses an application system for the first time, he will be directed to the authentication system to log in because he has not logged in yet; according to the login information provided by the user, the authentication system will The user performs identity verification, and if the verification is passed, an authentication credential——ticket will be returned to the user; when the user accesses other application systems, the ticket will be brought with him as his own authentication credential, and other application systems will accept the user's After the access request, the ticket provided by the user will be sent to the authentication system for validation to check the legitimacy of the ticket. If the verification is p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0815H04L29/06H04L63/0227H04L63/101H04L67/02G06F16/955
Inventor 龙海梅银明
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products