CN101588351A - Method for information security device for binding network software - Google Patents

Method for information security device for binding network software Download PDF

Info

Publication number
CN101588351A
CN101588351A CNA200810112065XA CN200810112065A CN101588351A CN 101588351 A CN101588351 A CN 101588351A CN A200810112065X A CNA200810112065X A CN A200810112065XA CN 200810112065 A CN200810112065 A CN 200810112065A CN 101588351 A CN101588351 A CN 101588351A
Authority
CN
China
Prior art keywords
information safety
safety devices
account number
key
binding
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CNA200810112065XA
Other languages
Chinese (zh)
Other versions
CN101588351B (en
Inventor
陆舟
于华章
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Feitian Technologies Co Ltd
Original Assignee
Beijing Feitian Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Feitian Technologies Co Ltd filed Critical Beijing Feitian Technologies Co Ltd
Priority to CN200810112065XA priority Critical patent/CN101588351B/en
Publication of CN101588351A publication Critical patent/CN101588351A/en
Application granted granted Critical
Publication of CN101588351B publication Critical patent/CN101588351B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention relates to the field of information technology safety, and in particular provides a method for an information security device for binding network software. The method comprises the following steps that: a service end generates corresponding accounts and keys according to a hardware identification number of the information security device, writes the hardware identification number, the corresponding accounts and keys into a network software database, and writes the accounts and keys into the information security device; specific information is written into the information security device, and the specific information is network software characteristic information and/or service end characteristic information; and a user acquires the information security device with the accounts, the keys and the specific information, installs the software, uses the software by using the specific information in the information security device, and uses the accounts and the keys in the information security device to carry out authentication. The binding method greatly improves the safety of the information security device.

Description

A kind of method of information safety devices of binding network software
Technical field
The present invention relates to the information technology security fields, provide a kind of method that improves security of network software, specifically a kind of method of information safety devices of binding network software.
Background technology
Information safety devices is a kind of small hardware device that has processor and memory, and it can be connected with computer by the data communication interface of computer.It has the key systematic function, but and the safe storage key, can preset the cryptographic algorithm function.The information safety devices computing relevant with key be fully at the device internal operation, and information safety devices has anti-characteristic of attacking, and fail safe is high.Information safety devices generally links to each other with computer by USB interface, is commonly called USB KEY or USBToken.
The progress of network technology provides wide development space for various based on network application.At present, have increasing people use by the software of the network operation carry out the work, activities such as study and amusement.
For example, Web-based instruction software is exactly a kind of software product that moves by network, utilize network technology on network, to realize multimedia teaching, integrate functions such as sync instruction, control, management, audio-video-frequency broadcast, online exam, and realize the purpose of network managements such as screen supervision and Long-distance Control simultaneously.
Also have, network media program request also is a kind of application of network technology, is the software that moves by network.It is network video-on-demand (VOD) that a kind of media-on-demand form is wherein arranged, it mainly adopts browser/server (B/S) framework, can be used to provide multiple streaming media services such as on-the-spot broadcasting, video request program, digital video broadcasting, can realize the program request of social activities miscellaneous, as news briefing or teleconference, sports tournament, concert, commercial propaganda, long-distance education or the like.
Also have online game software in addition, typical online game software is client/server (C/S) framework, comprises server end and client two parts, and both connect to come interactive information and data by network.Be different from traditional single-play game software, the major part of online game software operates on the webserver, and the terminal use can't obtain it, and user data also is stored on the server, and online game has developed into a kind of industry in many countries.
The operation way of existing network software is the service that relevant network software operation is provided and is safeguarded by network software operator (being called for short operator), be responsible for building the network information product server, finish work such as renewal to the various network information product, upgrading, mandate, and be that network software agents merchant (being called for short the agent) provides technical support, operator authorizes the agent power of sale, and the agent is responsible for selling software or the software Related product is located to the user.
Usually, when using network software, the user needs to realize authentication by usemame/password, because what the identity identifying method of this kind " usemame/password " used is single-factor authentication method (only by proving that a people's identity is referred to as the single-factor authentication meeting of a condition), the identity of only using a kind of condition judgment user is easily by counterfeit, so simple usemame/password mode is a kind of identification authentication mode that is absolutely unsafe.For example, some malefactor often utilize wooden horse and Hacker Program to steal identity identification informations such as legitimate network game player's account number, password, own then illegal these information of using participate in online game, or it is resell to other people, therefrom try to gain ill-gotten gains, cause very big loss for the legitimate network game player.The recreation account number is stolen have been become one and has made the rather problem of headache of online game operator and game players.
Summary of the invention
The present invention relates to a kind of method of information safety devices of binding network software, wherein information safety devices is from hardware manufacturer process operator, perhaps agent, perhaps directly be distributed to the user place, operator in this process, agent or subscription client program can dispose accordingly to information safety devices, comprise to wherein writing customizing messages and the binding of finishing key, the user is connected to information safety devices on the computer then, utilize this information safety devices to finish authentication, thereby the equipment that can ensure information security further reaches the final purpose of safe handling network software by the fail safe of manufacturer to this link of user.
The technical solution adopted for the present invention to solve the technical problems is:
A kind of method of information safety devices of binding network software may further comprise the steps:
A, service end generate corresponding account number and key according to the hardware identification number of information safety devices, described hardware identification number and corresponding account number and key write in the network software database, and with in described account number and the key writing information safety means;
B, customizing messages is write in the described information safety devices, described customizing messages is network software characteristic information and/or service end characteristic information;
C, user obtain the information safety devices that writes account number, key and customizing messages, described software is installed, utilize the described customizing messages in the information safety devices to use described network software, and utilize described account number and key in the information safety devices to carry out authentication.
Described steps A specifically comprises:
Operator is from manufacturer acquired information safety means, and generates corresponding account number and key according to the hardware identification number of information safety devices;
Operator is left described account number and key in the database of carrier server end in, finishes account number and the key of correspondence and the binding of network software;
Operator finishes the binding of described account number and key and information safety devices with described account number and key writing information safety means;
Accordingly, step B is specially: operator writes customizing messages in the described information safety devices.
Described steps A specifically comprises:
The agent is from manufacturer acquired information safety means, and generates corresponding account number and key according to the hardware identification number of information safety devices;
The agent finishes the binding of described account number and key and information safety devices with described account number and key writing information safety means;
The agent reports to operator with described account number and key, and operator is left described account number and key in the database of carrier server end in, finishes the binding of account number and key and network software;
Accordingly, step B is specially: the agent writes customizing messages in the described information safety devices.
Described steps A specifically comprises:
The user is from manufacturer acquired information safety means, and generates corresponding account number and key according to the hardware identification number of information safety devices;
The user utilizes described key to obtain account number at the server end of operator, and described account number and key are left in the database of described server end, finishes the binding of user account number and key and network software;
The user writes described information safety devices with account number and the corresponding key that obtains, and finishes the binding with information safety devices;
Accordingly, step B is specially: the user writes customizing messages in the described information safety devices.
Described customizing messages also comprises agent's characteristic information.
Compared with prior art, because the user need utilize information safety devices to cooperate the authentication of finishing network software with network software, because the double strong factor authentication of having adopted software and hardware to combine (proves a people's identity by making up two kinds of different conditions, be referred to as double factor authentication) pattern, therefore avoided the stolen phenomenon of account number, improve the fail safe of using, safeguarded the interests of validated user.Because the user can use an information safety devices to carry out authentication when a plurality of network software of login, such mode makes things convenient for user and agential operation, saves cost and manpower.And utilize binding method provided by the present invention, can highly effective supervising the network software relevant information safety means.
Description of drawings
Fig. 1 is the method flow diagram of the information safety devices of a kind of binding network software of the present invention;
Fig. 2 is the method flow diagram of the information safety devices of a kind of binding network software of the present invention;
Fig. 3 is the method flow diagram of the information safety devices of a kind of binding network software of the present invention.
Embodiment
The present invention will be further described below in conjunction with the drawings and specific embodiments, but not as a limitation of the invention.
Distribution method can have multiple implementation, introduces the implementation of three kinds of optimums below.
In following examples, described manufacturer is the information safety devices manufacturer, and described operator is an online game operator, and described agent is the online game agent, described user is the game player, and described information safety devices links to each other with computer by USB interface.
Embodiment 1:
As shown in Figure 1, a kind of method of information safety devices of binding network software may further comprise the steps.
Step 101: operator obtains information safety devices from manufacturer.
Operator can be from hardware manufacturer bulk purchase information safety devices.
Step 102: operator generates user account number and corresponding key, and it is write in the database.
Operator generates user's account number and corresponding with it key, and it is write in the database of server end, finishes the binding of account number and key and software.
Step 103: operator writes customizing messages in information safety devices.
After operator obtains information safety devices, write network software characteristic information and/or operator's characteristic information therein.
Step 104: operator is with in account number and the counterpart keys writing information safety means.
Operator finishes the binding of user account number, key and information safety devices with in user account number and the corresponding with it key writing information safety means.
Step 105: operator offers its agent with information safety devices.
According to the agreement that both sides reach, operator offers its agent with the information safety devices of some, and can collect corresponding cost, and the information safety devices of this moment is for finishing the equipment of binding.
Step 106: the agent is distributed to the user with this equipment.
For the ease of retrieval, the agent can be with in its agent's characteristic information writing information safety means.The agent consigns to the user by modes such as express delivery or mailing with information safety devices, and can collect corresponding cost.
Step 107: the user obtains and the install software client-side program.
The user can be installed in it on computer of oneself according to relevant prompting then by buying fixing disc or obtaining the software client program from modes such as network download.
Step 108: the user utilizes information safety devices to finish authentication, thereby brings into use network software.
The user is connected to information safety devices on the computer by USB interface, verify by input correct PIN code or biological information (as fingerprint, palmmprint, vocal print, retina, the shape of face etc.) whether it is the legal holder of information safety devices, by the validity of network verification user account number and counterpart keys.After checking is passed through, use
The family just can sign in to online game software and go forward side by side and play into network.
Embodiment 2:
As shown in Figure 2, a kind of method of information safety devices of binding network software may further comprise the steps.
Step 201: the agent obtains information safety devices from manufacturer.
The agent can be from hardware manufacturer bulk purchase information safety devices, and the payment corresponding cost.
Step 202: the agent writes customizing messages in this information safety devices.
The agent writes the network software characteristic information in information safety devices, also can write agent's characteristic information.
Step 203: the generation of user account number and counterpart keys.
User's account number and corresponding with it key can be located to generate the agent.
Step 204: with account number and corresponding key writing information safety means.
The agent finishes the binding of user account number and counterpart keys and information safety devices with in the user account number and counterpart keys writing information safety means that generate.
Step 205: the agent offers operator with user account number and counterpart keys.
User account number and counterpart keys that the agent needs to generate report to operator.
Step 206: operator writes user account number and counterpart keys in the database.
Operator writes user account number and counterpart keys in the server end database, finishes the binding of user account number and counterpart keys and software.
Step 207: the agent is distributed to the user with this information safety devices.
The agent can consign to the user with information safety devices by modes such as express delivery or mailing, is perhaps obtained to the place of agent's appointment by the user.The agent can collect corresponding cost.
Step 208: the user obtains and the install software client.
The user can mode obtains the software client program by buying fixing disc or download from the Internet etc., according to relevant prompting it is installed on the computer of oneself then.
Step 209: the user utilizes this information safety devices to finish authentication, and brings into use network software.
The user is connected to information safety devices on the computer by USB interface, verify by input correct PIN code or biological information (as fingerprint, palmmprint, vocal print, retina, the shape of face etc.) whether it is the legal holder of information safety devices, by the validity of network verification user account number and counterpart keys.After checking was passed through, the user just can sign in to online game software and go forward side by side and play into network.
Embodiment 3:
As shown in Figure 3, a kind of method of information safety devices of binding network software may further comprise the steps.
Step 301: the user obtains information safety devices from manufacturer.
The user directly buys information safety devices from the hardware manufacturer, and the payment corresponding cost.
Step 302: the user obtains and the install software client.
The user can mode obtains the software client program by buying fixing disc or download from the Internet etc., according to relevant prompting it is installed on the computer of oneself then.
Step 303: client writes customizing messages in information safety devices.
In information safety devices, write the network software characteristic information by software client.
Step 304: the generation of user account number and counterpart keys, and finish binding.
Client-side program visit information safety means, send key to information safety devices and generate order, information safety devices generates key and by client-side program key is forwarded to server end, and send the request of application account to server end, the server end response request, generate user account number and usersaccount information is returned client, client-side program is saved in information safety devices with usersaccount information, finishes user account number and the key of correspondence and the binding of information safety devices.Server end deposits key in the database in according to described usersaccount information, thereby finishes the binding of software and information safety devices.
Step 305: the user utilizes this information safety devices to finish authentication, and brings into use network software.The user is connected to information safety devices on the computer by USB interface, verify by input correct PIN code or biological information (as fingerprint, palmmprint, vocal print, retina, the shape of face etc.) whether it is the legal holder of information safety devices, by the validity of network verification account number and counterpart keys.After checking was passed through, the user just can sign in to online game software and go forward side by side and play into network.
In above all processes, the transfer of data between operator, agent and the user all adopts cipher mode to carry out, to guarantee the fail safe of data in transmission course.Operable cryptographic algorithm comprises RSA, DES, 3DES, AES etc.
The method of the information safety devices of a kind of binding network software that the embodiment of the invention provides, because the user need utilize information safety devices to cooperate the authentication of finishing network software with network software, because the double strong factor authentication of having adopted software and hardware to combine (proves a people's identity by making up two kinds of different conditions, be referred to as double factor authentication) pattern, therefore avoided the stolen phenomenon of account number, improve the fail safe of using, safeguarded the interests of validated user.Because the user can use an information safety devices to carry out authentication when a plurality of network software of login, such mode makes things convenient for user and agential operation, saves cost and manpower.And utilize binding method provided by the present invention, can highly effective supervising the network software relevant information safety means.
More than the method for the information safety devices of a kind of binding network software that the embodiment of the invention provided is described in detail.Used specific case herein principle of the present invention and execution mode are set forth, the explanation of above embodiment just is used for helping to understand method of the present invention and core concept thereof; Simultaneously, for one of ordinary skill in the art, according to thought of the present invention, part in specific embodiments and applications all can change.In sum, to should not be construed as be limitation of the present invention to this description.

Claims (5)

1, a kind of method of information safety devices of binding network software may further comprise the steps:
A, service end generate corresponding account number and key according to the hardware identification number of information safety devices, described hardware identification number and corresponding account number and key write in the network software database, and with in described account number and the key writing information safety means;
B, customizing messages is write in the described information safety devices, described customizing messages is network software characteristic information and/or service end characteristic information;
C, user obtain the information safety devices that writes account number, key and customizing messages, described software is installed, utilize the described customizing messages in the information safety devices to use described network software, and utilize described account number and key in the information safety devices to carry out authentication.
2, the method for the information safety devices of a kind of binding network software according to claim 1 is characterized in that, described steps A specifically comprises:
Operator is from manufacturer acquired information safety means, and generates corresponding account number and key according to the hardware identification number of information safety devices;
Operator is left described account number and key in the database of carrier server end in, finishes account number and the key of correspondence and the binding of network software;
Operator finishes the binding of described account number and key and information safety devices with described account number and key writing information safety means;
Accordingly, step B is specially: operator writes customizing messages in the described information safety devices.
3, the method for the information safety devices of a kind of binding network software according to claim 1 is characterized in that, described steps A specifically comprises:
The agent is from manufacturer acquired information safety means, and generates corresponding account number and key according to the hardware identification number of information safety devices;
The agent finishes the binding of described account number and key and information safety devices with described account number and key writing information safety means;
The agent reports to operator with described account number and key, and operator is left described account number and key in the database of carrier server end in, finishes the binding of account number and key and network software;
Accordingly, step B is specially: the agent writes customizing messages in the described information safety devices.
4, the method for the information safety devices of a kind of binding network software according to claim 1 is characterized in that, described steps A specifically comprises:
The user is from manufacturer acquired information safety means, and generates corresponding account number and key according to the hardware identification number of information safety devices;
The user utilizes described key to obtain account number at the server end of operator, and described account number and key are left in the database of described server end, finishes the binding of user account number and key and network software;
The user writes described information safety devices with account number and the corresponding key that obtains, and finishes the binding with information safety devices;
Accordingly, step B is specially: the user writes customizing messages in the described information safety devices.
5, the method for the information safety devices of a kind of binding network software according to claim 1 is characterized in that, described customizing messages also comprises agent's characteristic information.
CN200810112065XA 2008-05-21 2008-05-21 Method for information security device for binding network software Active CN101588351B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN200810112065XA CN101588351B (en) 2008-05-21 2008-05-21 Method for information security device for binding network software

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN200810112065XA CN101588351B (en) 2008-05-21 2008-05-21 Method for information security device for binding network software

Publications (2)

Publication Number Publication Date
CN101588351A true CN101588351A (en) 2009-11-25
CN101588351B CN101588351B (en) 2012-06-27

Family

ID=41372414

Family Applications (1)

Application Number Title Priority Date Filing Date
CN200810112065XA Active CN101588351B (en) 2008-05-21 2008-05-21 Method for information security device for binding network software

Country Status (1)

Country Link
CN (1) CN101588351B (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101977219A (en) * 2010-10-19 2011-02-16 中兴通讯股份有限公司 Method and device for protecting widget application
CN102420800A (en) * 2010-09-28 2012-04-18 俞浩波 Method, system and authentication terminal for accomplishing service by multi-factor identity authentication
CN102831362A (en) * 2012-07-25 2012-12-19 飞天诚信科技股份有限公司 Method and device for safely producing intelligent key device
CN103200566A (en) * 2013-02-26 2013-07-10 深圳市中兴移动通信有限公司 Implementation method and calibration method of partner mode between main device and partner device
CN103336918A (en) * 2013-06-21 2013-10-02 福建伊时代信息科技股份有限公司 Electronic hard disk system authorization method and device
CN104394170A (en) * 2014-12-11 2015-03-04 大唐微电子技术有限公司 Security account using method, safety device, server and system
CN102420800B (en) * 2010-09-28 2016-12-14 俞浩波 Method, system and the certification terminal of service is completed by multiple-factor authentication
CN110176987A (en) * 2016-02-02 2019-08-27 阿里巴巴集团控股有限公司 A kind of method, apparatus, equipment and the computer storage medium of equipment certification

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1283827A (en) * 2000-08-18 2001-02-14 郝孟一 Universal electronic information network authentication system and method
CN1925395A (en) * 2006-09-15 2007-03-07 北京飞天诚信科技有限公司 Method and device for improving utilization security of network software
CN100561916C (en) * 2006-12-28 2009-11-18 北京飞天诚信科技有限公司 A kind of method and system that upgrades authenticate key

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102420800A (en) * 2010-09-28 2012-04-18 俞浩波 Method, system and authentication terminal for accomplishing service by multi-factor identity authentication
CN102420800B (en) * 2010-09-28 2016-12-14 俞浩波 Method, system and the certification terminal of service is completed by multiple-factor authentication
CN101977219A (en) * 2010-10-19 2011-02-16 中兴通讯股份有限公司 Method and device for protecting widget application
CN101977219B (en) * 2010-10-19 2015-10-21 中兴通讯股份有限公司 A kind of widget application guard method and device
CN102831362A (en) * 2012-07-25 2012-12-19 飞天诚信科技股份有限公司 Method and device for safely producing intelligent key device
CN102831362B (en) * 2012-07-25 2014-12-10 飞天诚信科技股份有限公司 Method and device for safely producing intelligent key device
CN103200566A (en) * 2013-02-26 2013-07-10 深圳市中兴移动通信有限公司 Implementation method and calibration method of partner mode between main device and partner device
CN103336918A (en) * 2013-06-21 2013-10-02 福建伊时代信息科技股份有限公司 Electronic hard disk system authorization method and device
CN103336918B (en) * 2013-06-21 2017-02-15 福建伊时代信息科技股份有限公司 Electronic hard disk system authorization method and device
CN104394170A (en) * 2014-12-11 2015-03-04 大唐微电子技术有限公司 Security account using method, safety device, server and system
CN110176987A (en) * 2016-02-02 2019-08-27 阿里巴巴集团控股有限公司 A kind of method, apparatus, equipment and the computer storage medium of equipment certification

Also Published As

Publication number Publication date
CN101588351B (en) 2012-06-27

Similar Documents

Publication Publication Date Title
US11954675B2 (en) Systems and methods for implementing blockchain-based content engagement platforms utilizing media wallets
US11526582B2 (en) Systems and methods for enabling playback of digital content using status associable electronic tickets and ticket tokens representing grant of access rights
JP6940212B1 (en) Application linkage method, computer program and application linkage system
US10154020B1 (en) Referral identity system and method of operation thereof
CN113348479A (en) Anti-fraud cloud game block chain
US20130298215A1 (en) Single sign-on user registration for online or client account services
CN104995626A (en) Identification delegation for devices
CN101588351B (en) Method for information security device for binding network software
CN102047281A (en) CAPTCHA advertising
KR20110113179A (en) Software application verification
CN102822835B (en) Portable personal secure network access system
CN107465728A (en) Information processing method, central server and storage medium on identification code
WO2017192122A1 (en) Platform for appliance based resource catalog
US20130054424A1 (en) E-commerce transaction system and method for intangible merchandises
CN1925396B (en) Method and device for improving utilization security of network information product
US20130346297A1 (en) System and method for unified billing
JP4975065B2 (en) Settlement system, settlement method, and program
US20120005739A1 (en) Linked identities
KR20130138871A (en) Method of strengthening game item, server performing the same and storage media storing the same
CN102956016A (en) Electronic commerce trade method for non-tangible goods
EP3814967A1 (en) Systems and methods for implementing blockchain-based content engagement platforms utilizing media wallets
KR101611620B1 (en) Method and apparatus for linkage between on-line application and off-line application
US20240205214A1 (en) Method for controlling access to a good or service distributed by a data communication network
US20240163106A1 (en) Systems and Methods for Green Proof of Stake Consensus Mechanisms
KR20090012488A (en) Apparatus for protecting inventory item and method thereof

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant