CN101588351A - Method for information security device for binding network software - Google Patents
Method for information security device for binding network software Download PDFInfo
- Publication number
- CN101588351A CN101588351A CNA200810112065XA CN200810112065A CN101588351A CN 101588351 A CN101588351 A CN 101588351A CN A200810112065X A CNA200810112065X A CN A200810112065XA CN 200810112065 A CN200810112065 A CN 200810112065A CN 101588351 A CN101588351 A CN 101588351A
- Authority
- CN
- China
- Prior art keywords
- information safety
- safety devices
- account number
- key
- binding
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Landscapes
- Storage Device Security (AREA)
Abstract
The invention relates to the field of information technology safety, and in particular provides a method for an information security device for binding network software. The method comprises the following steps that: a service end generates corresponding accounts and keys according to a hardware identification number of the information security device, writes the hardware identification number, the corresponding accounts and keys into a network software database, and writes the accounts and keys into the information security device; specific information is written into the information security device, and the specific information is network software characteristic information and/or service end characteristic information; and a user acquires the information security device with the accounts, the keys and the specific information, installs the software, uses the software by using the specific information in the information security device, and uses the accounts and the keys in the information security device to carry out authentication. The binding method greatly improves the safety of the information security device.
Description
Technical field
The present invention relates to the information technology security fields, provide a kind of method that improves security of network software, specifically a kind of method of information safety devices of binding network software.
Background technology
Information safety devices is a kind of small hardware device that has processor and memory, and it can be connected with computer by the data communication interface of computer.It has the key systematic function, but and the safe storage key, can preset the cryptographic algorithm function.The information safety devices computing relevant with key be fully at the device internal operation, and information safety devices has anti-characteristic of attacking, and fail safe is high.Information safety devices generally links to each other with computer by USB interface, is commonly called USB KEY or USBToken.
The progress of network technology provides wide development space for various based on network application.At present, have increasing people use by the software of the network operation carry out the work, activities such as study and amusement.
For example, Web-based instruction software is exactly a kind of software product that moves by network, utilize network technology on network, to realize multimedia teaching, integrate functions such as sync instruction, control, management, audio-video-frequency broadcast, online exam, and realize the purpose of network managements such as screen supervision and Long-distance Control simultaneously.
Also have, network media program request also is a kind of application of network technology, is the software that moves by network.It is network video-on-demand (VOD) that a kind of media-on-demand form is wherein arranged, it mainly adopts browser/server (B/S) framework, can be used to provide multiple streaming media services such as on-the-spot broadcasting, video request program, digital video broadcasting, can realize the program request of social activities miscellaneous, as news briefing or teleconference, sports tournament, concert, commercial propaganda, long-distance education or the like.
Also have online game software in addition, typical online game software is client/server (C/S) framework, comprises server end and client two parts, and both connect to come interactive information and data by network.Be different from traditional single-play game software, the major part of online game software operates on the webserver, and the terminal use can't obtain it, and user data also is stored on the server, and online game has developed into a kind of industry in many countries.
The operation way of existing network software is the service that relevant network software operation is provided and is safeguarded by network software operator (being called for short operator), be responsible for building the network information product server, finish work such as renewal to the various network information product, upgrading, mandate, and be that network software agents merchant (being called for short the agent) provides technical support, operator authorizes the agent power of sale, and the agent is responsible for selling software or the software Related product is located to the user.
Usually, when using network software, the user needs to realize authentication by usemame/password, because what the identity identifying method of this kind " usemame/password " used is single-factor authentication method (only by proving that a people's identity is referred to as the single-factor authentication meeting of a condition), the identity of only using a kind of condition judgment user is easily by counterfeit, so simple usemame/password mode is a kind of identification authentication mode that is absolutely unsafe.For example, some malefactor often utilize wooden horse and Hacker Program to steal identity identification informations such as legitimate network game player's account number, password, own then illegal these information of using participate in online game, or it is resell to other people, therefrom try to gain ill-gotten gains, cause very big loss for the legitimate network game player.The recreation account number is stolen have been become one and has made the rather problem of headache of online game operator and game players.
Summary of the invention
The present invention relates to a kind of method of information safety devices of binding network software, wherein information safety devices is from hardware manufacturer process operator, perhaps agent, perhaps directly be distributed to the user place, operator in this process, agent or subscription client program can dispose accordingly to information safety devices, comprise to wherein writing customizing messages and the binding of finishing key, the user is connected to information safety devices on the computer then, utilize this information safety devices to finish authentication, thereby the equipment that can ensure information security further reaches the final purpose of safe handling network software by the fail safe of manufacturer to this link of user.
The technical solution adopted for the present invention to solve the technical problems is:
A kind of method of information safety devices of binding network software may further comprise the steps:
A, service end generate corresponding account number and key according to the hardware identification number of information safety devices, described hardware identification number and corresponding account number and key write in the network software database, and with in described account number and the key writing information safety means;
B, customizing messages is write in the described information safety devices, described customizing messages is network software characteristic information and/or service end characteristic information;
C, user obtain the information safety devices that writes account number, key and customizing messages, described software is installed, utilize the described customizing messages in the information safety devices to use described network software, and utilize described account number and key in the information safety devices to carry out authentication.
Described steps A specifically comprises:
Operator is from manufacturer acquired information safety means, and generates corresponding account number and key according to the hardware identification number of information safety devices;
Operator is left described account number and key in the database of carrier server end in, finishes account number and the key of correspondence and the binding of network software;
Operator finishes the binding of described account number and key and information safety devices with described account number and key writing information safety means;
Accordingly, step B is specially: operator writes customizing messages in the described information safety devices.
Described steps A specifically comprises:
The agent is from manufacturer acquired information safety means, and generates corresponding account number and key according to the hardware identification number of information safety devices;
The agent finishes the binding of described account number and key and information safety devices with described account number and key writing information safety means;
The agent reports to operator with described account number and key, and operator is left described account number and key in the database of carrier server end in, finishes the binding of account number and key and network software;
Accordingly, step B is specially: the agent writes customizing messages in the described information safety devices.
Described steps A specifically comprises:
The user is from manufacturer acquired information safety means, and generates corresponding account number and key according to the hardware identification number of information safety devices;
The user utilizes described key to obtain account number at the server end of operator, and described account number and key are left in the database of described server end, finishes the binding of user account number and key and network software;
The user writes described information safety devices with account number and the corresponding key that obtains, and finishes the binding with information safety devices;
Accordingly, step B is specially: the user writes customizing messages in the described information safety devices.
Described customizing messages also comprises agent's characteristic information.
Compared with prior art, because the user need utilize information safety devices to cooperate the authentication of finishing network software with network software, because the double strong factor authentication of having adopted software and hardware to combine (proves a people's identity by making up two kinds of different conditions, be referred to as double factor authentication) pattern, therefore avoided the stolen phenomenon of account number, improve the fail safe of using, safeguarded the interests of validated user.Because the user can use an information safety devices to carry out authentication when a plurality of network software of login, such mode makes things convenient for user and agential operation, saves cost and manpower.And utilize binding method provided by the present invention, can highly effective supervising the network software relevant information safety means.
Description of drawings
Fig. 1 is the method flow diagram of the information safety devices of a kind of binding network software of the present invention;
Fig. 2 is the method flow diagram of the information safety devices of a kind of binding network software of the present invention;
Fig. 3 is the method flow diagram of the information safety devices of a kind of binding network software of the present invention.
Embodiment
The present invention will be further described below in conjunction with the drawings and specific embodiments, but not as a limitation of the invention.
Distribution method can have multiple implementation, introduces the implementation of three kinds of optimums below.
In following examples, described manufacturer is the information safety devices manufacturer, and described operator is an online game operator, and described agent is the online game agent, described user is the game player, and described information safety devices links to each other with computer by USB interface.
Embodiment 1:
As shown in Figure 1, a kind of method of information safety devices of binding network software may further comprise the steps.
Step 101: operator obtains information safety devices from manufacturer.
Operator can be from hardware manufacturer bulk purchase information safety devices.
Step 102: operator generates user account number and corresponding key, and it is write in the database.
Operator generates user's account number and corresponding with it key, and it is write in the database of server end, finishes the binding of account number and key and software.
Step 103: operator writes customizing messages in information safety devices.
After operator obtains information safety devices, write network software characteristic information and/or operator's characteristic information therein.
Step 104: operator is with in account number and the counterpart keys writing information safety means.
Operator finishes the binding of user account number, key and information safety devices with in user account number and the corresponding with it key writing information safety means.
Step 105: operator offers its agent with information safety devices.
According to the agreement that both sides reach, operator offers its agent with the information safety devices of some, and can collect corresponding cost, and the information safety devices of this moment is for finishing the equipment of binding.
Step 106: the agent is distributed to the user with this equipment.
For the ease of retrieval, the agent can be with in its agent's characteristic information writing information safety means.The agent consigns to the user by modes such as express delivery or mailing with information safety devices, and can collect corresponding cost.
Step 107: the user obtains and the install software client-side program.
The user can be installed in it on computer of oneself according to relevant prompting then by buying fixing disc or obtaining the software client program from modes such as network download.
Step 108: the user utilizes information safety devices to finish authentication, thereby brings into use network software.
The user is connected to information safety devices on the computer by USB interface, verify by input correct PIN code or biological information (as fingerprint, palmmprint, vocal print, retina, the shape of face etc.) whether it is the legal holder of information safety devices, by the validity of network verification user account number and counterpart keys.After checking is passed through, use
The family just can sign in to online game software and go forward side by side and play into network.
Embodiment 2:
As shown in Figure 2, a kind of method of information safety devices of binding network software may further comprise the steps.
Step 201: the agent obtains information safety devices from manufacturer.
The agent can be from hardware manufacturer bulk purchase information safety devices, and the payment corresponding cost.
Step 202: the agent writes customizing messages in this information safety devices.
The agent writes the network software characteristic information in information safety devices, also can write agent's characteristic information.
Step 203: the generation of user account number and counterpart keys.
User's account number and corresponding with it key can be located to generate the agent.
Step 204: with account number and corresponding key writing information safety means.
The agent finishes the binding of user account number and counterpart keys and information safety devices with in the user account number and counterpart keys writing information safety means that generate.
Step 205: the agent offers operator with user account number and counterpart keys.
User account number and counterpart keys that the agent needs to generate report to operator.
Step 206: operator writes user account number and counterpart keys in the database.
Operator writes user account number and counterpart keys in the server end database, finishes the binding of user account number and counterpart keys and software.
Step 207: the agent is distributed to the user with this information safety devices.
The agent can consign to the user with information safety devices by modes such as express delivery or mailing, is perhaps obtained to the place of agent's appointment by the user.The agent can collect corresponding cost.
Step 208: the user obtains and the install software client.
The user can mode obtains the software client program by buying fixing disc or download from the Internet etc., according to relevant prompting it is installed on the computer of oneself then.
Step 209: the user utilizes this information safety devices to finish authentication, and brings into use network software.
The user is connected to information safety devices on the computer by USB interface, verify by input correct PIN code or biological information (as fingerprint, palmmprint, vocal print, retina, the shape of face etc.) whether it is the legal holder of information safety devices, by the validity of network verification user account number and counterpart keys.After checking was passed through, the user just can sign in to online game software and go forward side by side and play into network.
Embodiment 3:
As shown in Figure 3, a kind of method of information safety devices of binding network software may further comprise the steps.
Step 301: the user obtains information safety devices from manufacturer.
The user directly buys information safety devices from the hardware manufacturer, and the payment corresponding cost.
Step 302: the user obtains and the install software client.
The user can mode obtains the software client program by buying fixing disc or download from the Internet etc., according to relevant prompting it is installed on the computer of oneself then.
Step 303: client writes customizing messages in information safety devices.
In information safety devices, write the network software characteristic information by software client.
Step 304: the generation of user account number and counterpart keys, and finish binding.
Client-side program visit information safety means, send key to information safety devices and generate order, information safety devices generates key and by client-side program key is forwarded to server end, and send the request of application account to server end, the server end response request, generate user account number and usersaccount information is returned client, client-side program is saved in information safety devices with usersaccount information, finishes user account number and the key of correspondence and the binding of information safety devices.Server end deposits key in the database in according to described usersaccount information, thereby finishes the binding of software and information safety devices.
Step 305: the user utilizes this information safety devices to finish authentication, and brings into use network software.The user is connected to information safety devices on the computer by USB interface, verify by input correct PIN code or biological information (as fingerprint, palmmprint, vocal print, retina, the shape of face etc.) whether it is the legal holder of information safety devices, by the validity of network verification account number and counterpart keys.After checking was passed through, the user just can sign in to online game software and go forward side by side and play into network.
In above all processes, the transfer of data between operator, agent and the user all adopts cipher mode to carry out, to guarantee the fail safe of data in transmission course.Operable cryptographic algorithm comprises RSA, DES, 3DES, AES etc.
The method of the information safety devices of a kind of binding network software that the embodiment of the invention provides, because the user need utilize information safety devices to cooperate the authentication of finishing network software with network software, because the double strong factor authentication of having adopted software and hardware to combine (proves a people's identity by making up two kinds of different conditions, be referred to as double factor authentication) pattern, therefore avoided the stolen phenomenon of account number, improve the fail safe of using, safeguarded the interests of validated user.Because the user can use an information safety devices to carry out authentication when a plurality of network software of login, such mode makes things convenient for user and agential operation, saves cost and manpower.And utilize binding method provided by the present invention, can highly effective supervising the network software relevant information safety means.
More than the method for the information safety devices of a kind of binding network software that the embodiment of the invention provided is described in detail.Used specific case herein principle of the present invention and execution mode are set forth, the explanation of above embodiment just is used for helping to understand method of the present invention and core concept thereof; Simultaneously, for one of ordinary skill in the art, according to thought of the present invention, part in specific embodiments and applications all can change.In sum, to should not be construed as be limitation of the present invention to this description.
Claims (5)
1, a kind of method of information safety devices of binding network software may further comprise the steps:
A, service end generate corresponding account number and key according to the hardware identification number of information safety devices, described hardware identification number and corresponding account number and key write in the network software database, and with in described account number and the key writing information safety means;
B, customizing messages is write in the described information safety devices, described customizing messages is network software characteristic information and/or service end characteristic information;
C, user obtain the information safety devices that writes account number, key and customizing messages, described software is installed, utilize the described customizing messages in the information safety devices to use described network software, and utilize described account number and key in the information safety devices to carry out authentication.
2, the method for the information safety devices of a kind of binding network software according to claim 1 is characterized in that, described steps A specifically comprises:
Operator is from manufacturer acquired information safety means, and generates corresponding account number and key according to the hardware identification number of information safety devices;
Operator is left described account number and key in the database of carrier server end in, finishes account number and the key of correspondence and the binding of network software;
Operator finishes the binding of described account number and key and information safety devices with described account number and key writing information safety means;
Accordingly, step B is specially: operator writes customizing messages in the described information safety devices.
3, the method for the information safety devices of a kind of binding network software according to claim 1 is characterized in that, described steps A specifically comprises:
The agent is from manufacturer acquired information safety means, and generates corresponding account number and key according to the hardware identification number of information safety devices;
The agent finishes the binding of described account number and key and information safety devices with described account number and key writing information safety means;
The agent reports to operator with described account number and key, and operator is left described account number and key in the database of carrier server end in, finishes the binding of account number and key and network software;
Accordingly, step B is specially: the agent writes customizing messages in the described information safety devices.
4, the method for the information safety devices of a kind of binding network software according to claim 1 is characterized in that, described steps A specifically comprises:
The user is from manufacturer acquired information safety means, and generates corresponding account number and key according to the hardware identification number of information safety devices;
The user utilizes described key to obtain account number at the server end of operator, and described account number and key are left in the database of described server end, finishes the binding of user account number and key and network software;
The user writes described information safety devices with account number and the corresponding key that obtains, and finishes the binding with information safety devices;
Accordingly, step B is specially: the user writes customizing messages in the described information safety devices.
5, the method for the information safety devices of a kind of binding network software according to claim 1 is characterized in that, described customizing messages also comprises agent's characteristic information.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200810112065XA CN101588351B (en) | 2008-05-21 | 2008-05-21 | Method for information security device for binding network software |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200810112065XA CN101588351B (en) | 2008-05-21 | 2008-05-21 | Method for information security device for binding network software |
Publications (2)
Publication Number | Publication Date |
---|---|
CN101588351A true CN101588351A (en) | 2009-11-25 |
CN101588351B CN101588351B (en) | 2012-06-27 |
Family
ID=41372414
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN200810112065XA Active CN101588351B (en) | 2008-05-21 | 2008-05-21 | Method for information security device for binding network software |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101588351B (en) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101977219A (en) * | 2010-10-19 | 2011-02-16 | 中兴通讯股份有限公司 | Method and device for protecting widget application |
CN102420800A (en) * | 2010-09-28 | 2012-04-18 | 俞浩波 | Method, system and authentication terminal for accomplishing service by multi-factor identity authentication |
CN102831362A (en) * | 2012-07-25 | 2012-12-19 | 飞天诚信科技股份有限公司 | Method and device for safely producing intelligent key device |
CN103200566A (en) * | 2013-02-26 | 2013-07-10 | 深圳市中兴移动通信有限公司 | Implementation method and calibration method of partner mode between main device and partner device |
CN103336918A (en) * | 2013-06-21 | 2013-10-02 | 福建伊时代信息科技股份有限公司 | Electronic hard disk system authorization method and device |
CN104394170A (en) * | 2014-12-11 | 2015-03-04 | 大唐微电子技术有限公司 | Security account using method, safety device, server and system |
CN102420800B (en) * | 2010-09-28 | 2016-12-14 | 俞浩波 | Method, system and the certification terminal of service is completed by multiple-factor authentication |
CN110176987A (en) * | 2016-02-02 | 2019-08-27 | 阿里巴巴集团控股有限公司 | A kind of method, apparatus, equipment and the computer storage medium of equipment certification |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1283827A (en) * | 2000-08-18 | 2001-02-14 | 郝孟一 | Universal electronic information network authentication system and method |
CN1925395A (en) * | 2006-09-15 | 2007-03-07 | 北京飞天诚信科技有限公司 | Method and device for improving utilization security of network software |
CN100561916C (en) * | 2006-12-28 | 2009-11-18 | 北京飞天诚信科技有限公司 | A kind of method and system that upgrades authenticate key |
-
2008
- 2008-05-21 CN CN200810112065XA patent/CN101588351B/en active Active
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102420800A (en) * | 2010-09-28 | 2012-04-18 | 俞浩波 | Method, system and authentication terminal for accomplishing service by multi-factor identity authentication |
CN102420800B (en) * | 2010-09-28 | 2016-12-14 | 俞浩波 | Method, system and the certification terminal of service is completed by multiple-factor authentication |
CN101977219A (en) * | 2010-10-19 | 2011-02-16 | 中兴通讯股份有限公司 | Method and device for protecting widget application |
CN101977219B (en) * | 2010-10-19 | 2015-10-21 | 中兴通讯股份有限公司 | A kind of widget application guard method and device |
CN102831362A (en) * | 2012-07-25 | 2012-12-19 | 飞天诚信科技股份有限公司 | Method and device for safely producing intelligent key device |
CN102831362B (en) * | 2012-07-25 | 2014-12-10 | 飞天诚信科技股份有限公司 | Method and device for safely producing intelligent key device |
CN103200566A (en) * | 2013-02-26 | 2013-07-10 | 深圳市中兴移动通信有限公司 | Implementation method and calibration method of partner mode between main device and partner device |
CN103336918A (en) * | 2013-06-21 | 2013-10-02 | 福建伊时代信息科技股份有限公司 | Electronic hard disk system authorization method and device |
CN103336918B (en) * | 2013-06-21 | 2017-02-15 | 福建伊时代信息科技股份有限公司 | Electronic hard disk system authorization method and device |
CN104394170A (en) * | 2014-12-11 | 2015-03-04 | 大唐微电子技术有限公司 | Security account using method, safety device, server and system |
CN110176987A (en) * | 2016-02-02 | 2019-08-27 | 阿里巴巴集团控股有限公司 | A kind of method, apparatus, equipment and the computer storage medium of equipment certification |
Also Published As
Publication number | Publication date |
---|---|
CN101588351B (en) | 2012-06-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11954675B2 (en) | Systems and methods for implementing blockchain-based content engagement platforms utilizing media wallets | |
US11526582B2 (en) | Systems and methods for enabling playback of digital content using status associable electronic tickets and ticket tokens representing grant of access rights | |
JP6940212B1 (en) | Application linkage method, computer program and application linkage system | |
US10154020B1 (en) | Referral identity system and method of operation thereof | |
CN113348479A (en) | Anti-fraud cloud game block chain | |
US20130298215A1 (en) | Single sign-on user registration for online or client account services | |
CN104995626A (en) | Identification delegation for devices | |
CN101588351B (en) | Method for information security device for binding network software | |
CN102047281A (en) | CAPTCHA advertising | |
KR20110113179A (en) | Software application verification | |
CN102822835B (en) | Portable personal secure network access system | |
CN107465728A (en) | Information processing method, central server and storage medium on identification code | |
WO2017192122A1 (en) | Platform for appliance based resource catalog | |
US20130054424A1 (en) | E-commerce transaction system and method for intangible merchandises | |
CN1925396B (en) | Method and device for improving utilization security of network information product | |
US20130346297A1 (en) | System and method for unified billing | |
JP4975065B2 (en) | Settlement system, settlement method, and program | |
US20120005739A1 (en) | Linked identities | |
KR20130138871A (en) | Method of strengthening game item, server performing the same and storage media storing the same | |
CN102956016A (en) | Electronic commerce trade method for non-tangible goods | |
EP3814967A1 (en) | Systems and methods for implementing blockchain-based content engagement platforms utilizing media wallets | |
KR101611620B1 (en) | Method and apparatus for linkage between on-line application and off-line application | |
US20240205214A1 (en) | Method for controlling access to a good or service distributed by a data communication network | |
US20240163106A1 (en) | Systems and Methods for Green Proof of Stake Consensus Mechanisms | |
KR20090012488A (en) | Apparatus for protecting inventory item and method thereof |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant |