Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

System and method of preventing network account from stolen

A technology of network account and anti-theft method, which is applied in the field of network account anti-theft system, and can solve the problems of inconvenient use, failure to use dynamic encryption, misalignment of clocks, etc.

Inactive Publication Date: 2006-07-26
黄涛
View PDF0 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] 2. And every time the user logs in, he needs to enter a long series of irregular random numbers through the keyboard. Once he enters a wrong number, he must re-operate
Moreover, it is especially easy to be refused to log in due to clock misalignment or network delay when operating near the time point of dynamic password change, which is very inconvenient to use
[0006] 3. Since the password continues to be valid within a certain time window after the user logs in, there is a risk that hackers will use Trojan horse software and other means to track and record and use the password to log in within the time window
[0015] ◆For iKey, only one layer of hash algorithm encryption is done, no dynamic encryption is used

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method of preventing network account from stolen
  • System and method of preventing network account from stolen
  • System and method of preventing network account from stolen

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0088] Such as figure 1 As shown: the network account anti-theft system of the present invention includes: an external network account anti-theft device 1, a client 2, an application server 4, a network authentication management server 5, and a programming device 6. The external network account anti-theft device and the client are connected via USB, Various communication interfaces such as serial port, infrared, Bluetooth, etc. are connected, and the client is connected with the application server and the network authentication management server through the network 3 (Internet, local area network, wireless network, etc.).

[0089] The external network account anti-theft device, which is connected to the client terminal, is used to verify account information (such as internally stored account user passwords (usually high-strength passwords or secondary passwords of account users), serial numbers, and account information) , Verification sequence, etc.) After dynamic encryption and ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This invention provides one network id number anti-theft system and its method, which comprises the following steps: a, connecting one only sequence number outside anti-theft device to customer end; b, outside anti-theft device id number correction information to generate servo requirement id number correction message content through dynamic coding and public key; c, outside anti-theft device sending correction message codes and id codes through customer end on internet; d, application servo de-coding correction message through public formula to audit the message; e, testing whether the messages are correct.

Description

Technical field [0001] The invention belongs to the field of computer and network information security, and relates to a network identity authentication system and a method thereof, and specifically, to a network account anti-theft system and a method thereof. Background technique [0002] At present, the existing identity authentication products include: USB Key, USB token, RSA SecurID identity authentication token and Smart Cards and USB Authenticators, SafeNet's iKey series, Smart Key, Datakey, Gemplus smart card, Feitian Credit Epass identity authentication lock, etc. The most commonly used are the RSA SecurID authentication token and SafeNet's iKey series. [0003] Among them, the RSA SecurID identity authentication token uses a dynamic password system, which is composed of a password token on the user side and an authentication server on the application system side. The authentication server is the core part of the entire system. It is connected to the application system se...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32
CPCH04L63/1466H04L9/32
Inventor 黄涛
Owner 黄涛
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products