Unlock instant, AI-driven research and patent intelligence for your innovation.

Safety protection method and device for preventing blasting attack

A technology for security protection and security components, applied in the field of security protection tools for explosion-proof attacks, can solve the problems that the random number mechanism cannot effectively protect the explosion attacks, the influence of the verification code mechanism, etc. Effect

Pending Publication Date: 2022-08-09
SHANDONG LUNENG SOFTWARE TECH
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] The embodiment of the present invention provides a security protection method and device for preventing blasting attacks, aiming to solve the problems that the verification code mechanism in the existing blasting attack solutions affects the user's use, and the random number mechanism cannot effectively protect against blasting attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety protection method and device for preventing blasting attack
  • Safety protection method and device for preventing blasting attack
  • Safety protection method and device for preventing blasting attack

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0028] figure 2 It is a schematic flow chart of a security protection method for explosion-proof attack provided by an embodiment of the present invention, such as figure 2 shown, including the following steps:

[0029] Step S101 : the anti-explosive attack client security component set on the client of the business system adds the anti-explosive attack security parameter that reduces the user verification code input into the login request, and sends it to the server of the business system.

[0030] Step S102: After receiving the login request, the security component of the anti-explosive attack server set on the server of the business system reduces the number of users to the login request to which the anti-explosive attack security parameter that reduces the input of the user verification code has been added. The verification code is input for anti-explosive attack security verification, and according to the anti-explosive attack security verification result, a login resp...

Embodiment 2

[0039] image 3 It is a schematic structural diagram of a safety protection device for explosion-proof attack provided by an embodiment of the present invention, such as image 3 As shown, the device (or security protection tool) includes an anti-explosive attack client security component (or an anti-explosive attack security component client) set on the client of the business system and an anti-explosive attack security component set on the server of the business system. The blasting attack server security component (or the explosion-proof attacking security component server), in which:

[0040] The explosion-proof attack client security component is used to add the explosion-proof attack security parameters used to reduce user verification code input into the login request, and send it to the server of the business system;

[0041] The anti-explosion attack server security component is configured to, after the server receives the login request, perform an anti-explosive att...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a safety protection method and device for preventing blasting attacks, and relates to the technical field of software safety protection. The method comprises the following steps: an anti-blasting attack client security component arranged at a client of a service system adds anti-blasting attack security parameters for reducing user verification code input into a login request, and sends the login request to a server of the service system; and after the server side receives the login request, an anti-blasting attack server side security component arranged at the server side of the business system performs anti-blasting attack security verification for reducing the user verification code input on the login request added with anti-blasting attack security parameters for reducing the user verification code input, and sending a login response to the client according to an anti-blasting attack security verification result. By adopting the method and the device, more effective security defense for blasting attacks can be realized while user verification code input is reduced.

Description

technical field [0001] The invention relates to the technical field of software security protection, in particular to a security protection tool for explosion-proof attack. Background technique [0002] BruteForceAttacks refers to an attack method that uses a large number of guesses and exhaustive methods to try to obtain a user password (referred to as password) or send a packet that the destination host has received to deceive the system. The main principles are as follows : [0003] like Figure 1a As shown, the attacker host A has been enumerating user passwords and sending data requests to the server host B. Since the content of the response packets of successful and failed blasting is different, the attacker host A can detect the response data from the server host B by detecting The package can be a good judge of whether the blasting is successful. [0004] like Figure 1b As shown, the host A wants to send a data request to the server host B, and the attacker C ste...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40H04L9/08H04L9/22
CPCH04L63/1483H04L9/0863H04L9/0662
Inventor 薛念明魏光玉刘涛谢吉伦张坤焦杰李勋段佳希
Owner SHANDONG LUNENG SOFTWARE TECH