Method for protecting safety of account number cipher

A password security and account number technology, applied in the field of account password security protection, can solve problems such as low reliability, high cost of use, easy loss, etc., and achieve the effect of high reliability, low cost, and enhanced authentication strength

Inactive Publication Date: 2006-09-13
陈珂
View PDF0 Cites 51 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since the password changes dynamically with time, it is impossible for anyone without a password card to know the password. Therefore, this password technology is much safer than a static password. , small size, easy to carry, defects of this technology: high cost of use, easy to lose, easy to damage, low reliability, password generation depends entirely on time synchronization, if the time difference between the client and server is large, the password card will be It will be invalid and cause the user to be unable to log in to the system;
This is because the account information and key used for identity authentication are not directly readable, external applications can only send input factors used for calculation, and the entire calculation process is completely completed by the CPU in the ePass online game anti-theft lock. The calculation result is transmitted to the external application, so that the key is absolutely impossible to be intercepted by an external hacker program, and the calculation of the key is an irreversible algorithm, and the value of the key cannot be reversed through the calculation structure, and then passed to ePass The calculation results outside the online game anti-theft lock will also change with each input data. Even if the value to be calculated for each authentication is recorded, the purpose of fraudulent identity cannot be achieved. Its advantages and disadvantages are the same as those of the "dynamic password card".

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for protecting safety of account number cipher

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] The following describes the operation process of the method of the present invention in conjunction with the accompanying drawings:

[0018] The user needs to submit the user's account name and mobile phone number to the registration authentication server system, and the system binds the user's account name and mobile phone number to each other; when logging in, the user submits his account name to the system's SMS platform through the SMS gateway in the form of mobile phone SMS when logging in. And indicate to the system whether there is a time limit; after receiving the user’s login request, the system SMS platform extracts the account name and user’s mobile phone number in the user’s SMS, and forwards them to the system authentication server. The authentication server receives the account name and user’s mobile phone. After the number is retrieved in the database of the system authentication server, if the account name and mobile phone number in the user login request ma...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

This invention relates to a method for protecting safety of codes of account numbers including the following steps: a user should submit the account number name and its cell phone number to a registration certification server system, which binds the name and the number, logs on the request, then the server certifies and sends it the verification code, the user logs on then the server certifies it.

Description

(1) Technical field [0001] The invention relates to the operation and application technology of the combination of short message transmission and computer database, in particular to a method for protecting the security of account passwords. (2) Background technology [0002] At present, there are three main methods for publicly known account password protection: [0003] The first is the static password authentication technology, which uses the user's "account name" and "password" to authenticate and identify the legitimacy of the user. Its main feature is to use a fixed password to activate a specific account, but due to the password and As a soft identification, the account number is static and unchanging, and there are many drawbacks and security loopholes in the network transmission. The cracking technology for it is constantly developing, and many tools and methods can be used to steal the account and password, such as stealing and deciphering. , Peeping, cheating, etc. In a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/16
Inventor 陈珂
Owner 陈珂
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products