Supercharge Your Innovation With Domain-Expert AI Agents!

The method of safe certification service

A service method and security access technology, applied in the field of preventing leakage of button input passwords of access control locking devices, can solve problems such as inability to intercept information, and achieve the effects of expanding the scope of passwords, preventing phishing, and preventing authentication attempts

Inactive Publication Date: 2011-05-18
SOLMAZE CO LTD
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Moreover, in the services provided by a large number of Internet sites, if the user checks the security access option when logging in, the user's ID and password are encrypted using the international standard 128-bit SSL (Secure Socket Layer). can be used in payment, etc., so that hackers cannot intercept these information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • The method of safe certification service
  • The method of safe certification service
  • The method of safe certification service

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] The present invention consists of four main steps. The individual steps are now described.

[0021] figure 1 It is a flow chart showing the main program flow of the present invention.

[0022] 1. Authentication step by text input (S100)

[0023] This step is the most common method of authenticating by keying in ID and password. Therefore, its detailed description is omitted here.

[0024] 2. Access location tracking step (S200)

[0025] If the user passes the authentication step using text input, flow proceeds to the web page for the authentication step by coordinate input. At this time, a JAVA program (JAVA applet) executing the access location tracking function is automatically downloaded into the user's computer, and then the user's current access location is reported to the server. The server stores this information.

[0026] A description of the technology for tracking access locations by JAVA programs can be found in Korean Patent Application No. 10-2001-00...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to safe authentication. According to the present invention, a security access service method includes an authentication step by the input of text, an access location tracking step, an authentication step by the input of coordinates, and an access history report step.

Description

technical field [0001] The present invention relates to user authentication, and more particularly to a technology capable of preventing fraudulent use of personal IDs and passwords stolen through keyboard input information and leakage of button input type passwords of access control locking devices. Background technique [0002] Various PC security programs are currently commercially available. These programs provide functions of monitoring illegal hacking or whether hacking programs are installed, and so on. [0003] Moreover, in the services provided by a large number of Internet sites, if the user checks the security access option when logging in, the user's ID and password are encrypted using the international standard 128-bit SSL (Secure Socket Layer). It can be used in payment, etc., so that hackers cannot intercept these information. Contents of the invention [0004] However, conventional security programs for PCs only work in the corresponding computer. Theref...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F17/10G06F21/30
Inventor 黄在烨梁基昊
Owner SOLMAZE CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More