CN105577611A - Computer safety realization method and computer safety realization device based on hardware and server authentication - Google Patents

Computer safety realization method and computer safety realization device based on hardware and server authentication Download PDF

Info

Publication number
CN105577611A
CN105577611A CN201410532737.8A CN201410532737A CN105577611A CN 105577611 A CN105577611 A CN 105577611A CN 201410532737 A CN201410532737 A CN 201410532737A CN 105577611 A CN105577611 A CN 105577611A
Authority
CN
China
Prior art keywords
user
server
computer
hardware
server authentication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410532737.8A
Other languages
Chinese (zh)
Other versions
CN105577611B (en
Inventor
任刚
舒畅
张家福
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Link Polytron Technologies Inc.
Original Assignee
GUANGZHOU LIANYI INFORMATION TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by GUANGZHOU LIANYI INFORMATION TECHNOLOGY Co Ltd filed Critical GUANGZHOU LIANYI INFORMATION TECHNOLOGY Co Ltd
Priority to CN201410532737.8A priority Critical patent/CN105577611B/en
Publication of CN105577611A publication Critical patent/CN105577611A/en
Application granted granted Critical
Publication of CN105577611B publication Critical patent/CN105577611B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention provides a computer safety realization method and a computer safety realization device based on hardware and server authentication. The computer safety realization method is characterized in that a user name and a password can be input in a computer for authentication of a server; after the authentication, the computer can be used to acquire a user identification, an exclusive hardware identification, and a date code, and can be used to carry out a reversible encryption processing to acquire user safety identification information; the user safety identification information can be uploaded to the server by adopting the safety transmission channel; the user identification, the exclusive hardware identification, and the date code, which are corresponding to the user safety identification information, can be stored in the server; during the reauthentication, the server can be used to verify whether the exclusive hardware identification is matched with the data code, when yes, the next step can be carried out, and otherwise, the authentication fails; after the reauthentication, the data code after the reversible encryption processing in the user safety identification information can be updated. The computer safety realization method and the computer safety realization device based on the hardware and server authentication are advantageous in that the safety performance is higher.

Description

A kind of computer security implementation method based on hardware and server authentication and device
Technical field
The present invention relates to computer safety field, particularly a kind of computer security implementation method based on hardware and server authentication and device.
Background technology
At computer safety field, traditional method is that the user name password for verifying is sent to service end after encryption.Under this mode, its password is the combination of simple numeral and character, this password is uploaded to service end after encryption, this kind of mode is after user name password is revealed, easily use after other places are verified, reduce fail safe, its server end also effectively cannot control behavior and the state of user.
Summary of the invention
The technical problem to be solved in the present invention is, for the defect that the above-mentioned fail safe of prior art is not high, and the computer security implementation method based on hardware and server authentication providing a kind of fail safe higher and device.
The technical solution adopted for the present invention to solve the technical problems is: construct a kind of computer security implementation method based on hardware and server authentication, comprise the steps:
A) on described computer, input username and password and carry out certification by server;
B) after certification is passed through, described computer obtains user ID, unique hardware identification and date codes;
C) user security identifying information is obtained after reversible encryption process being carried out to described user ID, unique hardware identification and date codes;
D) described user security identifying information is uploaded to described server by use safety transmission channel;
E) described server is by user ID before treatment for reversible encryption, unique hardware identification and date codes and user security identifying information corresponding stored;
F) user is again through the certification of described server, and whether its unique hardware identification of described server authentication and date codes mate, and in this way, then performs step G); Otherwise, authentification failure;
G) again after described server authentication passes through, the date codes after reversible encryption process in user security identifying information is upgraded.
Of the present invention based in the computer security implementation method of hardware and server authentication, described unique hardware identification comprises hard disk serial number and MAC Address.
Of the present invention based in the computer security implementation method of hardware and server authentication, described date codes is encoded by date during certification to current.
Of the present invention based in the computer security implementation method of hardware and server authentication, described secure transmission tunnel is the passage set up at client and server, and transmission means is https protocol transmission.
Of the present invention based in the computer security implementation method of hardware and server authentication, what described reversible encryption adopted is DES reversible encryption mode.
The invention still further relates to a kind of device realizing the computer security implementation method of above-mentioned hardware and server authentication, comprising: input unit: carrying out certification for inputting username and password on described computer by server;
Acquiring unit: for after certification is passed through, described computer obtains user ID, unique hardware identification and date codes;
Ciphering unit: obtain user security identifying information after reversible encryption process is carried out to described user ID, unique hardware identification and date codes;
Uploading unit: described user security identifying information is uploaded to described server for use safety transmission channel;
Memory cell: for making described server by user ID before treatment for reversible encryption, unique hardware identification and date codes and user security identifying information corresponding stored;
Authentication unit: for user again through the certification of described server, whether its unique hardware identification of described server authentication and date codes mate, in this way, certification is by the date codes after reversible encryption process in rear renewal user security identifying information; Otherwise, authentification failure;
Certification updating block: for again after described server authentication passes through, upgrades the date codes after reversible encryption process in user security identifying information.
In the device of the computer security implementation method realizing above-mentioned hardware and server authentication of the present invention, described unique hardware identification comprises hard disk serial number and MAC Address.
In the device of the computer security implementation method realizing above-mentioned hardware and server authentication of the present invention, described date codes is encoded by date during certification to current.
In the device of the computer security implementation method realizing above-mentioned hardware and server authentication of the present invention, described secure transmission tunnel is the passage set up at client and server, and transmission means is https protocol transmission.
In the device of the computer security implementation method realizing above-mentioned hardware and server authentication of the present invention, what described reversible encryption adopted is DES reversible encryption mode.
Implement the computer security implementation method based on hardware and server authentication of the present invention and device, have following beneficial effect: due to after certification is passed through, computer obtains user ID, unique hardware identification and date codes and obtains user security identifying information after carrying out reversible encryption process; When user is again through the certification of server, whether its unique hardware identification of server authentication and date codes mate, namely by mode that secondary is verified, and in conjunction with the legitimacy of unique hardware identification and date codes decision verification user, one-one relationship between user bound and computer, strengthen the stringency of user rs authentication, so its fail safe is higher.
Accompanying drawing explanation
In order to be illustrated more clearly in the embodiment of the present invention or technical scheme of the prior art, be briefly described to the accompanying drawing used required in embodiment or description of the prior art below, apparently, accompanying drawing in the following describes is only some embodiments of the present invention, for those of ordinary skill in the art, under the prerequisite not paying creative work, other accompanying drawing can also be obtained according to these accompanying drawings.
Fig. 1 is the flow chart that the present invention is based on method in the computer security implementation method of hardware and server authentication and device embodiment;
Fig. 2 is the structural representation of device in described embodiment.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, be clearly and completely described the technical scheme in the embodiment of the present invention, obviously, described embodiment is only the present invention's part embodiment, instead of whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art, not making the every other embodiment obtained under creative work prerequisite, belong to the scope of protection of the invention.
In the computer security implementation method that the present invention is based on hardware and server authentication and device embodiment, its flow chart based on the computer security implementation method of hardware and server authentication as shown in Figure 1.In Fig. 1, the method comprises the steps: that step S01 inputs username and password on computers and carries out certification by server: in this step, be verified username and password first and carry out certification through server, it is worth mentioning that, the username and password verified first is distributed by server, only has legal user just can obtain.The username and password of this distribution can only bind the unique computer by server authentication.
Step S02 is after certification is passed through, computer obtains user ID, unique hardware identification and date codes: in this step, after the serviced device certification of username and password is passed through, computer obtains user ID, unique hardware identification and date codes, it is worth mentioning that, in the present embodiment, user ID is unique, user ID is for current system user, unique hardware identification comprises hard disk serial number and MAC Address, and date codes is encoded by the date (namely current date) during certification to current.
Step S03 obtains user security identifying information after carrying out reversible encryption process to user ID, unique hardware identification and date codes: in this step, in order to increase the fail safe of system, after reversible encryption is carried out to user ID, unique hardware identification and date codes, obtain user security identifying information.In the present embodiment, what reversible encryption adopted is DES reversible encryption mode, current, under the certain situation of the present embodiment, also can select other cipher mode.
User security identifying information is uploaded onto the server by step S04 use safety transmission channel: in this step, user security identifying information is uploaded onto the server by use safety transmission channel, this secure transmission tunnel is the passage set up at client and server, and transmission means is https protocol transmission.So also can increase the fail safe of system.
Step S05 server is by user ID before treatment for reversible encryption, unique hardware identification and date codes and user security identifying information corresponding stored: in this step, and server is by user ID before treatment for reversible encryption, unique hardware identification and date codes and user security identifying information corresponding stored.
Step S06 user is again through the certification of server, whether its unique hardware identification of server authentication and date codes mate: in this step, user is again through the certification of server, whether its unique hardware identification of server authentication and date codes mate, if the result of checking is yes, then perform step S07; Otherwise, perform step S08.
Step S07, again after server authentication passes through, upgrades the date codes after reversible encryption process in user security identifying information: if the judged result of above-mentioned steps S06 is yes, and namely unique hardware identification and date codes coupling, then perform this step.In this step, again after server authentication passes through, upgrade the date codes after reversible encryption process in user security identifying information.
Step S08 authentification failure: if the judged result of above-mentioned steps S06 is no, namely unique hardware identification and date codes are not mated, then perform this step.In this step, the result of return authentication failure.The mode that the present invention is verified by secondary, and in conjunction with the legitimacy of unique hardware identification and date codes decision verification user, the one-one relationship between user bound and computer, strengthens the stringency of user rs authentication, so its fail safe is higher.It is worth mentioning that, after server have recorded user name and user security identifying information, user cannot change the computer of client again, if user needs to change computer, again must obtain legal username and password to server, this further improves the fail safe of system.
The present embodiment also relates to a kind of device realizing the above-mentioned computer security implementation method based on hardware and server authentication, and its structural representation as shown in Figure 2.In Fig. 2, this device comprises input unit 1, acquiring unit 2, ciphering unit 3, uploading unit 4, memory cell 5, authentication unit 6 and certification updating block 7; Wherein, input unit 1 carries out certification for inputting username and password on computers by server; Acquiring unit 2 is for after certification is passed through, and computer obtains user ID, unique hardware identification and date codes; Ciphering unit 3 obtains user security identifying information after carrying out reversible encryption process to user ID, unique hardware identification and date codes; User security identifying information is uploaded onto the server for use safety transmission channel by uploading unit 4; Memory cell 5 is for making server by user ID before treatment for reversible encryption, unique hardware identification and date codes and user security identifying information corresponding stored; Authentication unit 6 for user again through the certification of server, whether its unique hardware identification of server authentication and date codes mate, and in this way, certification is by the date codes after reversible encryption process in rear renewal user security identifying information; Otherwise, authentification failure; Certification updating block 7, for again after server authentication passes through, upgrades the date codes after reversible encryption process in user security identifying information.The mode that the present invention is verified by secondary, and in conjunction with the legitimacy of unique hardware identification and date codes decision verification user, the one-one relationship between user bound and computer, strengthens the stringency of user rs authentication, so its fail safe is higher.It is worth mentioning that, after server have recorded user name and user security identifying information, user cannot change the computer of client again, if user needs to change computer, again must obtain legal username and password to server, this further improves the fail safe of system.
It is worth mentioning that, in the present embodiment, above-mentioned unique hardware identification comprises hard disk serial number and MAC Address, and certainly, unique hardware identification also can comprise the hardware identifier of other types.Above-mentioned date codes is encoded by date during certification to current.Secure transmission tunnel is the passage set up at client and server, and transmission means is https protocol transmission, can increase the fail safe of system like this.What above-mentioned reversible encryption adopted is DES reversible encryption mode, certainly, also can adopt other cipher mode, and the Method compare of its encryption is flexible.
In a word, in the present embodiment, the user name using server subtend user to distribute, password carry out first time checking, and user security identifying information is generated to unique subscriber identification, unique hardware identification and the date codes that computer obtains, when again verifying, verify the matching of its unique hardware identification and date codes, which enhance the fail safe of system, so its fail safe is higher.
The foregoing is only preferred embodiment of the present invention, not in order to limit the present invention, within the spirit and principles in the present invention all, any amendment done, equivalent replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (10)

1., based on a computer security implementation method for hardware and server authentication, it is characterized in that, comprise the steps:
A) on described computer, input username and password and carry out certification by server;
B) after certification is passed through, described computer obtains user ID, unique hardware identification and date codes;
C) user security identifying information is obtained after reversible encryption process being carried out to described user ID, unique hardware identification and date codes;
D) described user security identifying information is uploaded to described server by use safety transmission channel;
E) described server is by user ID before treatment for reversible encryption, unique hardware identification and date codes and user security identifying information corresponding stored;
F) user is again through the certification of described server, and whether its unique hardware identification of described server authentication and date codes mate, and in this way, then performs step G); Otherwise, authentification failure;
G) again after described server authentication passes through, the date codes after reversible encryption process in user security identifying information is upgraded.
2. the computer security implementation method based on hardware and server authentication according to claim 1, it is characterized in that, described unique hardware identification comprises hard disk serial number and MAC Address.
3. the computer security implementation method based on hardware and server authentication according to claim 2, it is characterized in that, described date codes is encoded by date during certification to current.
4. the computer security implementation method based on hardware and server authentication according to claims 1 to 3 any one, is characterized in that, described secure transmission tunnel is the passage set up at client and server, and transmission means is https protocol transmission.
5. the computer security implementation method based on hardware and server authentication according to claim 4, is characterized in that, what described reversible encryption adopted is DES reversible encryption mode.
6. realize, as claimed in claim 1 based on a device for the computer security implementation method of hardware and server authentication, it is characterized in that, comprising:
Input unit: carry out certification by server for inputting username and password on described computer;
Acquiring unit: for after certification is passed through, described computer obtains user ID, unique hardware identification and date codes;
Ciphering unit: obtain user security identifying information after reversible encryption process is carried out to described user ID, unique hardware identification and date codes;
Uploading unit: described user security identifying information is uploaded to described server for use safety transmission channel;
Memory cell: for making described server by user ID before treatment for reversible encryption, unique hardware identification and date codes and user security identifying information corresponding stored;
Authentication unit: for user again through the certification of described server, whether its unique hardware identification of described server authentication and date codes mate, in this way, certification is by the date codes after reversible encryption process in rear renewal user security identifying information; Otherwise, authentification failure;
Certification updating block: for again after described server authentication passes through, upgrades the date codes after reversible encryption process in user security identifying information.
7. the device realizing the above-mentioned computer security implementation method based on hardware and server authentication according to claim 6, it is characterized in that, described unique hardware identification comprises hard disk serial number and MAC Address.
8. the device realizing the above-mentioned computer security implementation method based on hardware and server authentication according to claim 7, it is characterized in that, described date codes is encoded by date during certification to current.
9. the device realizing the above-mentioned computer security implementation method based on hardware and server authentication according to claim 6 to 8 any one, it is characterized in that, described secure transmission tunnel is the passage set up at client and server, and transmission means is https protocol transmission.
10. the device realizing the above-mentioned computer security implementation method based on hardware and server authentication according to claim 9, it is characterized in that, what described reversible encryption adopted is DES reversible encryption mode.
CN201410532737.8A 2014-10-10 2014-10-10 A kind of computer security implementation method and device based on hardware and server authentication Active CN105577611B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410532737.8A CN105577611B (en) 2014-10-10 2014-10-10 A kind of computer security implementation method and device based on hardware and server authentication

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410532737.8A CN105577611B (en) 2014-10-10 2014-10-10 A kind of computer security implementation method and device based on hardware and server authentication

Publications (2)

Publication Number Publication Date
CN105577611A true CN105577611A (en) 2016-05-11
CN105577611B CN105577611B (en) 2019-05-24

Family

ID=55887279

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410532737.8A Active CN105577611B (en) 2014-10-10 2014-10-10 A kind of computer security implementation method and device based on hardware and server authentication

Country Status (1)

Country Link
CN (1) CN105577611B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106302539A (en) * 2016-10-12 2017-01-04 广州市芯德电子技术有限公司 A kind of embedded type WEB safety certifying method
CN106789883A (en) * 2016-11-21 2017-05-31 美的智慧家居科技有限公司 The method and apparatus of connection server
CN112002080A (en) * 2019-05-27 2020-11-27 中电金融设备系统(深圳)有限公司 Bank terminal, bank terminal equipment and information security processing method

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2435117A (en) * 2006-02-10 2007-08-15 Rabbit Point Ltd Automatic roaming authentication in IP-based communication
CN102638794B (en) * 2007-03-22 2016-03-30 华为技术有限公司 Authentication and cryptographic key negotiation method, authentication method, system and equipment
CN101179583B (en) * 2007-12-17 2010-12-08 杭州华三通信技术有限公司 Method and equipment preventing user counterfeit internet
CN101697542B (en) * 2009-10-19 2015-01-28 中兴通讯股份有限公司 Authentication method, soft switch and terminal
CN102664903A (en) * 2012-05-16 2012-09-12 李明 Network user identifying method and system

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106302539A (en) * 2016-10-12 2017-01-04 广州市芯德电子技术有限公司 A kind of embedded type WEB safety certifying method
CN106789883A (en) * 2016-11-21 2017-05-31 美的智慧家居科技有限公司 The method and apparatus of connection server
CN112002080A (en) * 2019-05-27 2020-11-27 中电金融设备系统(深圳)有限公司 Bank terminal, bank terminal equipment and information security processing method
CN112002080B (en) * 2019-05-27 2022-02-15 中电金融设备系统(深圳)有限公司 Bank terminal, bank terminal equipment and information security processing method

Also Published As

Publication number Publication date
CN105577611B (en) 2019-05-24

Similar Documents

Publication Publication Date Title
CN102479304B (en) Method, client and system for software access control
CN101742499B (en) Account number protection system for mobile communication equipment terminal and application method thereof
US10154018B2 (en) Method and system for facilitating network joining
US20180082050A1 (en) Method and a system for secure login to a computer, computer network, and computer website using biometrics and a mobile computing wireless electronic communication device
CN110264182B (en) Electronic certificate management system
US10243745B2 (en) Method and system for producing a secure communication channel for terminals
US10454913B2 (en) Device authentication agent
CN104079581A (en) Identity authentication method and device
CN105007577A (en) Virtual SIM card parameter management method, mobile terminal and server
US10726130B2 (en) Method and device for verifying upgrade of diagnosis connector of diagnostic equipment, and diagnosis connector
CN104125565A (en) Method for realizing terminal authentication based on OMA DM, terminal and server
CN103875211A (en) Internet account management method, manager, server, and system
CN109005159B (en) Data processing method for terminal access system server and authentication server
US10256976B2 (en) Method and apparatus for information interaction
KR102173345B1 (en) System and method for authenticating critical operations on solid-state drives
CN104811303B (en) The method, apparatus and system of two-way authentication
CN108418893A (en) A kind of method of smart machine firmware safety upgrade
WO2020057314A1 (en) Method, device and system for issuing esim certificate online
JP2012191270A (en) Authentication system, terminal apparatus, authentication server and program
CN112887340B (en) Password resetting method and device, service management terminal and storage medium
CN104506321A (en) Method for updating seed data in dynamic token
CN103188677A (en) Client software authentication method and client software authentication device and client software authentication system
CN105577611A (en) Computer safety realization method and computer safety realization device based on hardware and server authentication
CN111901303A (en) Device authentication method and apparatus, storage medium, and electronic apparatus
KR20190018377A (en) Method and apparatus for storing mnemonic of hardware bitcoin wallet, and computer readable recording medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP03 Change of name, title or address
CP03 Change of name, title or address

Address after: 510000 No. 16 Keyun Road, Tianhe District, Guangzhou City, Guangdong Province, 1 501

Patentee after: Link Technology Co., Ltd.

Address before: 510665 No. 16 Keyun Road, Tianhe District, Guangzhou City, Guangdong Province, 1 501

Patentee before: Guangzhou Lianyi Information Technology Co., Ltd.

PE01 Entry into force of the registration of the contract for pledge of patent right
PE01 Entry into force of the registration of the contract for pledge of patent right

Denomination of invention: Computer safety realization method and computer safety realization device based on hardware and server authentication

Effective date of registration: 20200426

Granted publication date: 20190524

Pledgee: China Co truction Bank Corp Guangzhou economic and Technological Development Zone sub branch

Pledgor: LIANYI TECHNOLOGY Co.,Ltd.

Registration number: Y2020440000096

CP01 Change in the name or title of a patent holder
CP01 Change in the name or title of a patent holder

Address after: 510000 No. 16 Keyun Road, Tianhe District, Guangzhou City, Guangdong Province, 1 501

Patentee after: Link Polytron Technologies Inc.

Address before: 510000 No. 16 Keyun Road, Tianhe District, Guangzhou City, Guangdong Province, 1 501

Patentee before: LIANYI TECHNOLOGY Co.,Ltd.