Method for preventing leakage of user information

A user information and user name technology, applied in user identity/authority verification, encryption devices with shift registers/memory, electrical components, etc., can solve problems such as user information loss, and achieve the effect of improving security performance

Active Publication Date: 2018-01-19
SICHUAN CHANGHONG ELECTRIC CO LTD
View PDF5 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method can ensure the security of the user's plaintext password, but if a hacker intercepts the encrypted value, he can simulate sending a request without obtaining the user's plaintext password, obtain server authorization, and cause loss of user information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for preventing leakage of user information
  • Method for preventing leakage of user information
  • Method for preventing leakage of user information

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The present invention will be further elaborated and described below in conjunction with the accompanying drawings and specific embodiments of the present invention.

[0033] figure 1 A schematic diagram of the overall flow of the method for preventing user information leakage according to the present invention is shown. The client sends a registration request, and the server returns a key. The client uses the key value to encrypt, and transmits the encrypted data to the server for storage. The user inputs Username and password, send a login request, verify on the server side, and return data.

[0034] figure 2 The registration flow chart of the present invention is shown, and the registration steps are as follows:

[0035] S1: The user fills in the user name and password, and sends a registration request;

[0036] S2: The server judges whether the reception is successful, if it fails, the process ends, and if it succeeds, it enters step S3;

[0037] S3: The server...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for preventing the leakage of user information. The method for preventing the leakage of user information comprises the following steps: a client sends a registrationrequest; the server side returns a key; the client uses the key value for encryption and transmits the encrypted data to the server side; the user enters the user name password and sends a login request; the server side performs verification and returns the data. According to the invention, the security mechanism is the dynamic nature, the timestamp of each login is inconsistent, and even if a hacker intercepts the encrypted value, the encrypted value will lose efficacy if the sent request can not be simulated within 2 minutes; the invention has great significance to improve the security of the user information.

Description

technical field [0001] The invention relates to the field of computer technology and software development, in particular to a method for preventing user information leakage by sending an http request security authentication from a client to a server. Background technique [0002] With the rapid development and wide application of mobile Internet technology, a large number of mobile terminal equipment apps serve people's lives, and user information security has become a great hidden danger. At present, in the process of user login request, there are various ways to store user name and password, mainly including the following methods: one is that both the server and the mobile end perform the same encryption algorithm on the plaintext password for verification. The server side stores the user's plaintext password, and once the server side leaks it, there will be a great risk. One is to agree on a set of public and private keys between the client and the server, the client sav...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/06H04L9/32
Inventor 李伟光马春燕刘蛟李丹丹
Owner SICHUAN CHANGHONG ELECTRIC CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products