Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

System and method of preventing network account from stolen

A technology of network account and anti-theft method, which is applied in the field of network account anti-theft system, and can solve problems such as inconvenient use, refusal to log in, misalignment of clocks, etc.

Inactive Publication Date: 2010-09-08
黄涛
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] 2. And every time the user logs in, he needs to enter a long series of irregular random numbers through the keyboard. Once he enters a wrong number, he must re-operate
Moreover, it is especially easy to be refused to log in due to clock misalignment or network delay when operating near the time point of dynamic password change, which is very inconvenient to use
[0006] 3. Since the password continues to be valid within a certain time window after the user logs in, there is a risk that hackers will use Trojan horse software and other means to track and record and use the password to log in within the time window
[0015] ◆For iKey, only one layer of hash algorithm encryption is done, no dynamic encryption is used

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method of preventing network account from stolen
  • System and method of preventing network account from stolen
  • System and method of preventing network account from stolen

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0088] As shown in Figure 1: network account anti-theft system of the present invention comprises: external network account anti-theft device 1, client 2, application server 4, network authentication management server 5, programming equipment 6, described external network account anti-theft device and client It is connected through various communication interfaces such as USB, serial port, infrared, bluetooth, etc., and the client is connected with the application server and the network authentication management server through the network 3 (Internet, local area network, wireless network, etc.).

[0089] The external network account anti-theft device, which is connected to the client, is used to verify account information (such as internally stored account user passwords (generally high-strength passwords or secondary passwords of account users), serial numbers, account information, etc. , verification sequence, etc.) After dynamic encryption and public key encryption, the acco...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This invention provides one network id number anti-theft system and its method, which comprises the following steps: a, connecting one only sequence number outside anti-theft device to customer end; b, outside anti-theft device id number correction information to generate servo requirement id number correction message content through dynamic coding and public key; c, outside anti-theft device sending correction message codes and id codes through customer end on internet; d, application servo de-coding correction message through public formula to audit the message; e, testing whether the messages are correct.

Description

technical field [0001] The invention belongs to the field of computer and network information security, and relates to a network identity authentication system and its method, in particular to a network account anti-theft system and its method. Background technique [0002] At present, the existing identity authentication products include: USB Key, USB token, RSA SecurID identity authentication token and Smart Cards and USB Authenticators, SafeNet's iKey series, Smart Key, Datakey, Gemplus smart card, Feitian Chengxin's Epass identity authentication lock, etc. Among the most commonly used are RSA SecurID authentication tokens and SafeNet's iKey series. [0003] Among them, the RSA SecurID identity authentication token adopts a dynamic password system, which is composed of a password token at the user end and an authentication server at the application system end. The authentication server is the core part of the whole system, which is connected with the application system s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32
CPCH04L9/32H04L63/1466
Inventor 黄涛
Owner 黄涛
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products