CN1780207A - Internet accounting number confirmation - Google Patents
Internet accounting number confirmation Download PDFInfo
- Publication number
- CN1780207A CN1780207A CN 200410091403 CN200410091403A CN1780207A CN 1780207 A CN1780207 A CN 1780207A CN 200410091403 CN200410091403 CN 200410091403 CN 200410091403 A CN200410091403 A CN 200410091403A CN 1780207 A CN1780207 A CN 1780207A
- Authority
- CN
- China
- Prior art keywords
- user
- account number
- card
- network
- antitheft
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
A method for authenticating the network account number of user includes such steps as creating the relative relation between account number of user and the cipher array of its antitheft card, modifying the authentication part of server software by adding the check to the cipher of antitheft card, inputting the cipher by user, and checking it for determining if the user can access network.
Description
Technical field
The present invention relates to the account number confirmation method on a kind of network, particularly relate to the account number confirmation method that prevents that user account number is stolen on the network.
Background technology
Along with developing rapidly of network application, online game, virtual community and online transaction are frequent day by day, and meanwhile, the fail safe of these network applications also causes people's attention day by day.Network application at present confirms that the modal mode of identity is, uses user name and password.But stolen phenomenon often appears in all types of user name and password, and the network user is suffered a loss.At this phenomenon, Virtual network operator has adopted a series of anti-theft measure at server end, can prevent that some are by stealing the behavior of user cipher to server attack.Yet,, do not have effective measures for by following the tracks of the steal-number behavior of user side.At publication number is among the CN1512356A, disclose a kind of at network user end, by preserve the technical scheme once confirm password and user's personal identification number only with mobile memory.Technique scheme can solve the steal-number behavior of steal-number person at user side power formula, but when realizing, the user need use mobile memories such as floppy disk or USB flash disk, thereby in use increases cost and complexity.
Summary of the invention
Technical problem to be solved by this invention is conveniently, prevents that user account number is stolen on the network cheaply, account number confirmation method on a kind of network is provided.
Technical scheme of the present invention is to adopt a kind of simple, the cheap anti-steal-number solution of random cipher table mode.May further comprise the steps: propose the card operation, the network user's the login account number and the scrambling matrix of an antitheft card are set up corresponding relation; Authentication operation is revised the authentication section of server software, and the authentication section with the source code write or authentication module add original system adds the checking to antitheft card random cipher; Login judges that during network user login, according to system prompt random coordinates position, according to antitheft card input password, the authentication section of server software authenticates the password that transmits by network; By authenticating then permits access, not by the authentication disable access.
The above-mentioned user who carries the card operation by antitheft card system, promptly Virtual network operator is realized, may further comprise the steps: enter the binding page; The antitheft card card number that provides according to the user and the scrambling matrix of a correspondence of code extraction; Related scrambling matrix and the user account number that extracts.
When the network user does not wish to continue its account number of binding, can unbind, separate the user of bindings by antitheft card system, promptly Virtual network operator is realized, may further comprise the steps: enter and separate the binding page; According to system prompt random coordinates position, according to the scrambling matrix input password of binding antitheft card, the authentication section of server software authenticates the password that transmits by network; By authentication, remove the related of scrambling matrix and user account number.
Be the further fail safe of increase system, the antitheft card card number that the user of antitheft card system provides according to the user and the corresponding scrambling matrix of code extraction are the matrix strings of an encryption, and the user is by key, and the matrix string of enabling decryption of encrypted obtains scrambling matrix.
For the user who avoids other non-anti-theft card systems binds or remove user account number and password under unauthorized situation, the user of antitheft card system needs the account number and the password of use authority when carrying card and remove the account number binding operation.
In addition, authorize account number that a useful life is arranged, the account number that surpasses this time limit can be forbidden automatically by system.
Use above-mentioned network account confirmation method, owing to constitute by the password that multidigit produces at random with the password of user account number binding, and it is all different when logining at every turn, make steal-number person be difficult to analyze and draw whole scrambling matrixs, therefore can guarantee the safety of network behaviors such as online game, virtual community, online transaction.And its realization mainly is by software mode and antitheft card, and for the network user and Virtual network operator, use cost is low and convenient.
Description of drawings
Fig. 1 is of the present invention and network user account binding flow chart
Fig. 2 is of the present invention and network user account unbind state flow chart
Fig. 3 is that network user login of the present invention is judged flow process
Embodiment
[embodiment 1]
At first by the user of antitheft card system, promptly Virtual network operator is proposed the card operation, and the network user's the login account number and the scrambling matrix of an antitheft card are set up corresponding relation.Concrete steps are, be introduced into the binding page, use offers the mandate account number and the password of Virtual network operator, confirm its legal identity, licencing key adopts 128 md5 encryption results' 16 systems to represent, the useful life of this mandate account number is 6 months, and the account number that surpasses this time limit can be forbidden automatically by system.20 antitheft card card numbers inputing again that the user provides and 8 bit digital passwords, antitheft card card number is made up of 20 bit digital, has comprised timestamp, random code and identifying code, so that guarantee can not the property guessed.Wherein, identifying code is 5 shaping numbers that obtain by after the conversion of MD5 checking algorithm.Described numerical ciphers adopts 128 md5 encryption results' 16 system passwords to represent.System returns different values according to above-mentioned two group accounts and the password of input, comprising:
00 proposes the card success
11 authorize account number not exist
12 authorize account number to be sealed and stopped
13 licencing keys are incorrect
14 authorized addresses are incorrect
15 authorize account number out of date
21 matrix card numbers do not exist or are used
22 matrix pins are incorrect
23 matrix card numbers are out of date
The graunch of 99 systems
When return value is 00, i.e. the card success is proposed in expression, and immediately following the matrix content-encrypt character string of 192 letters, the user is by key subsequently, and clear crytpographic key is deciphered the matrix content after the encryption of extracting.The method of its deciphering is: is the encryption string that obtains that unit splits according to 2 bytes, altogether removablely be divided into 96 pairs, every pair is 2 letters, here, its real representation be one 16 system number, as 8E, the letter of the clear crytpographic key that each 16 system number and system are provided (authorizing account number to provide together with test during test) correspondence position carries out XOR and gets final product then:
Encrypt string: 1CDEF356...AC32D9 (192 letters (96 16 system numbers))
Clear crytpographic key: Ach6rTdu8juyrx...surrTYu93
Calculating process is as follows:
0x1C X or ′A′
0xDE X or ′c′
.
0xD9 X or ′3′
Carry out related with user account number the scrambling matrix that extracts after deciphering.
Then, revise the authentication section of server software, the authentication section with the source code write or authentication module add original system adds the checking to antitheft card random cipher.
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | |
A | A7 | Ut | bY | 6t | k9 | 5v | v4 | hC |
B | Db | Nc | Gm | Hh | WZ | Hc | 0c | 5f |
C | 3b | mK | 51 | Vc | Xx | b7 | dg | f4 |
D | Ew | 98 | Xt | 8y | h9 | ch | ge | dj |
E | XH | tp | Eb | Nx | 76 | 79 | eH | 52 |
F | Yh | 23 | bY | 3k | 9d | 25 | td | hr |
When network user login, according to 8 random coordinates positions of system prompt E3A5D7B1, import password Ebk9geDb according to the scrambling matrix shown in as above showing, the authentication section of server software authenticates the password that transmits by network, by authenticating then permits access, not by the authentication disable access.
[embodiment 2]
When the user does not wish that account number continues binding, can require the user of burglary-resisting system, promptly the network operator removes its account number binding.Concrete steps: at first enter and separate the binding page, use offers the mandate account number and the password of Virtual network operator, confirm its legal identity, licencing key adopts 128 md5 encryption results' 16 systems to represent, the useful life of this mandate account number is 6 months, and the account number that surpasses this time limit can be forbidden automatically by system.20 antitheft card card numbers inputing again that the user provides and 8 bit digital passwords, same 128 md5 encryption results' the 16 system passwords that adopt of this numerical ciphers are represented.System authenticates according to above-mentioned two group accounts and the password of input, and after authentication was passed through, system user can remove the related of scrambling matrix and user account number.
Claims (6)
1. the account number confirmation method on the network may further comprise the steps:
Propose the card operation, the network user's the login account number and the scrambling matrix of an antitheft card are set up corresponding relation;
Authentication operation is revised the authentication section of server software, and the authentication section with the source code write or authentication module add original system adds the checking to antitheft card random cipher;
Login judges that during network user login, according to system prompt random coordinates position, according to antitheft card input password, the authentication section of server software authenticates the password that transmits by network;
By authenticating then permits access, not by the authentication disable access.
2. the account number confirmation method on the network as claimed in claim 1 is characterized in that, carries the card operation user by antitheft card system, and promptly Virtual network operator is realized, may further comprise the steps:
Enter the binding page;
The antitheft card card number that provides according to the user and the scrambling matrix of a correspondence of code extraction;
Related scrambling matrix and the user account number that extracts.
3. the account number confirmation method on the network as claimed in claim 1 is characterized in that, also comprises separating the user of bindings by antitheft card system, and promptly Virtual network operator is realized, may further comprise the steps:
Enter and separate the binding page;
According to system prompt random coordinates position, according to the scrambling matrix input password of binding antitheft card, the authentication section of server software authenticates the password that transmits by network;
By authentication, remove the related of scrambling matrix and user account number.
4. the account number confirmation method on the network as claimed in claim 2, it is characterized in that, the antitheft card card number that the user of antitheft card system provides according to the user and the corresponding scrambling matrix of code extraction, it is the matrix string of an encryption, the user passes through key, the matrix string of enabling decryption of encrypted obtains scrambling matrix.
5. as the account number confirmation method on claim 2 or the 3 described networks, it is characterized in that the user of antitheft card system needs the account number and the password of use authority when carrying card and remove the account number binding operation.
6. the confirmation method on the network account as claimed in claim 4, it is characterized in that authorize account number that a useful life is arranged, useful life is meant: the user must be with the antitheft card and the account number binding of oneself must playing before this date, expired invalid, in case still binding is finished then is not subjected to valid expiration date system.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 200410091403 CN1780207A (en) | 2004-11-24 | 2004-11-24 | Internet accounting number confirmation |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 200410091403 CN1780207A (en) | 2004-11-24 | 2004-11-24 | Internet accounting number confirmation |
Publications (1)
Publication Number | Publication Date |
---|---|
CN1780207A true CN1780207A (en) | 2006-05-31 |
Family
ID=36770339
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN 200410091403 Pending CN1780207A (en) | 2004-11-24 | 2004-11-24 | Internet accounting number confirmation |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN1780207A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101425896B (en) * | 2007-10-29 | 2010-12-22 | 李斯鸿 | Network account ciphering method |
CN101217371B (en) * | 2008-01-09 | 2011-10-05 | 腾讯科技(深圳)有限公司 | A method to realize user account verification |
CN102495811A (en) * | 2011-12-12 | 2012-06-13 | 创新科软件技术(深圳)有限公司 | Method for generating and validating license and storage equipment |
CN102821106A (en) * | 2012-08-22 | 2012-12-12 | 句容市盛世软件有限公司 | Electronic document non-repudiation method |
CN113207305A (en) * | 2018-12-11 | 2021-08-03 | Ccs 12公司 | Device and method for protecting safety data of bank payment card |
-
2004
- 2004-11-24 CN CN 200410091403 patent/CN1780207A/en active Pending
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101425896B (en) * | 2007-10-29 | 2010-12-22 | 李斯鸿 | Network account ciphering method |
CN101217371B (en) * | 2008-01-09 | 2011-10-05 | 腾讯科技(深圳)有限公司 | A method to realize user account verification |
CN102495811A (en) * | 2011-12-12 | 2012-06-13 | 创新科软件技术(深圳)有限公司 | Method for generating and validating license and storage equipment |
CN102495811B (en) * | 2011-12-12 | 2015-04-22 | 创新科软件技术(深圳)有限公司 | Method for generating and validating license and storage equipment |
CN102821106A (en) * | 2012-08-22 | 2012-12-12 | 句容市盛世软件有限公司 | Electronic document non-repudiation method |
CN113207305A (en) * | 2018-12-11 | 2021-08-03 | Ccs 12公司 | Device and method for protecting safety data of bank payment card |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP3230238U (en) | A system for securely storing electronic data | |
CN102202040B (en) | Client authentication method and device | |
CN110149328B (en) | Interface authentication method, device, equipment and computer readable storage medium | |
US9077710B1 (en) | Distributed storage of password data | |
RU2263407C2 (en) | Data protection method | |
CN1281025C (en) | Password variable identification verification technique | |
CN106506159A (en) | Encryption method and equipment for key safety | |
CN1439207A (en) | A platform and method for establishing provable identities while maintaining privacy | |
CN1842757A (en) | Method and apparatus for incremental code signing | |
WO2008089202A2 (en) | Format-preserving cryptographic systems | |
CN1825796A (en) | Network encryption system based on picture keyboard and operating method thereof | |
CN101064602A (en) | Cipher inputting method and system | |
CN1782941A (en) | Software authorizing and protecting device and method | |
US20010048359A1 (en) | Restriction method for utilization of computer file with use of biometrical information, method of logging in computer system and recording medium | |
Gulsezim et al. | Two factor authentication using twofish encryption and visual cryptography algorithms for secure data communication | |
WO2015062441A1 (en) | Cgi web interface multi-session verification code generation and verification method | |
CN1780207A (en) | Internet accounting number confirmation | |
Boonkrong | Security of passwords | |
CN104751042A (en) | Credibility detection method based on password hash and biometric feature recognition | |
CN112347462A (en) | Server system authentication method, device, electronic computer and storage medium | |
CN1905448A (en) | Computer network account number safety protecting method and serving system | |
CN1199110C (en) | Software protection method | |
CN109412754B (en) | Data storage, distribution and access method of coding cloud | |
CN1271525C (en) | Computer system landing method | |
CN101034420A (en) | Network game virtual property off line preservation mode and application |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |