CN1925395A - Method and device for improving utilization security of network software - Google Patents

Method and device for improving utilization security of network software Download PDF

Info

Publication number
CN1925395A
CN1925395A CN 200610113134 CN200610113134A CN1925395A CN 1925395 A CN1925395 A CN 1925395A CN 200610113134 CN200610113134 CN 200610113134 CN 200610113134 A CN200610113134 A CN 200610113134A CN 1925395 A CN1925395 A CN 1925395A
Authority
CN
China
Prior art keywords
network software
intelligent key
binding
key apparatus
utilization
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN 200610113134
Other languages
Chinese (zh)
Inventor
陆舟
于华章
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Feitian Technologies Co Ltd
Original Assignee
Beijing Feitian Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Feitian Technologies Co Ltd filed Critical Beijing Feitian Technologies Co Ltd
Priority to CN 200610113134 priority Critical patent/CN1925395A/en
Publication of CN1925395A publication Critical patent/CN1925395A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

This invention provides one method and system to improve network information product safety in information safety technique field, wherein, the method comprises the following steps: generating network software user number and its relative keys through network operator and to improve network software safety through binding method between user number and its relative keys and intelligent keys device.

Description

A kind of method and apparatus that improves the network software safety in utilization
Technical field
The present invention relates to field of information security technology, particularly a kind of method and apparatus that improves the network software safety in utilization.
Background technology
Along with the high speed development of computer technology, it is more and more general that the use of network software also becomes.Online game software for example, typical online game software is client/server (Client/Server) framework, comprises server end and client two parts, both connect to come interactive information and data by network.Be different from traditional single-play game software, the major part of online game software operates on the webserver, and the terminal use can't obtain it, and user data also is stored on the server, and online game has developed into a kind of industry in many countries.
Intelligent key apparatus is a kind of small hardware device that has processor and memory, and it can be connected with computer by the data communication interface of computer, and its communication interface is USB interface normally, for example USB Key, USB Token or USB fingerprint KEY etc.Intelligent key apparatus has the key generation and presets the cryptographic algorithm function, but and safe storage key.The computing relevant with key be fully at the intelligent key apparatus internal operation, and intelligent key apparatus has anti-characteristic of attacking, and fail safe is high.The identity authorization system of intelligent key apparatus mainly contains two kinds of authentication modes: one is based on the authentication mode of PKI system, and two are based on the authentication mode of impulse response.
The asymmetric key cipher system is the authentication mode of the PKI system used always, and in the asymmetric key cipher system, encryption key and decruption key have nothing in common with each other, can only be with corresponding with it private key deciphering with the data of public key encryption.The digital signature of public key system had both guaranteed the confidentiality of information, guaranteed that again information has non repudiation, its principle is: at first will be expressly with the side's of being verified private key signature, obtain digital signature, then digital signature is sent to authentication, authentication is decrypted with the PKI of the side of being verified, and last and original text compares, and verifies.
HMAC-Hash is a kind of impact commonly used/response authentication mode.HMAC-Hash is that hash algorithm also claims one-way Hash algorithm to the reinforcement of Hash (Hash) algorithm, is meant under the situation of known operations result and algorithm also the algorithm that can not backwards calculation goes out raw information.Hash function has a kind of like this function: it is to the output that the input information (being commonly called as seed) of different length produces regular length, and the output of this regular length is called " hash " or " Message digest (eap-message digest) " of former input information.HMAC (keyed-Hashing Message Authentication Code) with key in conjunction with the Hash computing, and each computing all has random data to participate in, with the result data difference that guarantees that each verification process produces, even there is malefactor to intercept and capture certain verify data like this, also can't be by authentication next time.
The abundant study that provides at people's enjoy network software and the resource of amusement have also been brought many problems to people simultaneously.For example; the user is in order to obtain to use the qualification of certain network software; through regular meeting registered user name and account number on the internet; be used for carrying out the network ID of authenticated user; but because the insecurity of Network Transmission, these user names and number of the account are easy to be passed through network monitoring by others, or use special technique to steal; fail safe when having had a strong impact on authentication makes some users suffer unnecessary loss.And when the user need obtain to use the qualification of multiple network software, the user need use different user names and account number, if the network software that uses also needs to pay, the user also needs to buy from the network software agents merchant thing of a plurality of similar rechargeable cards and so on, and this has also brought a lot of inconvenience for the user.For example, for some paying online game, recreation operator is responsible for mainly that maintenance, upgrading, distribution Games Software to recreation given the recreation agent, produced the card of game points, work such as updating user data storehouse at any time; The recreation agent mainly is responsible for selling the card of game points, also the Games Software that obtains from recreation operator can be sold to the user sometimes; The user need buy the some card of certain face amount card of game points sales section (generally being the agent, newsstand etc. of recreation), and by registered user name and account number, and the mode of the password of the input card of game points activates recreation, obtains game player's qualification.The user wants to become the players of different recreation, just needs to buy different some cards, the fail safe when this mode not only influences authenticating user identification, and brought inconvenience to the user, increased some card publisher's burden.
Summary of the invention
Loaded down with trivial details in order to solve user's flow process when using network software, and the problem that in the mode of utilizing authentication obtains the competency for operation process of network software, has potential safety hazard, the present invention proposes a kind of method of utilizing the intelligent key apparatus of having bound user account and key to obtain the competency for operation of network software, said method comprising the steps of:
Steps A: network software operator generates network software information, and it is write customer data base, finishes the binding of described network software information and network software;
Step B: described network software information is write intelligent key apparatus, finish the binding of described network software and described intelligent key apparatus;
Step C: the user uses the described intelligent key apparatus of having finished binding to carry out authentication, obtains to use the qualification of described network software.
Described network software information comprises user account number and corresponding with it key.
Described steps A specifically comprises:
Steps A 1: network software operator generates described user account number;
Steps A 2: described network software operator generates and the corresponding key of described user account number in that described intelligent key apparatus is inner;
Steps A 3: described network software operator writes customer data base with described user account number and corresponding with it key, finishes the binding of described network software information and network software.
Described steps A specifically comprises:
Steps A 1 ': network software operator generates described user account number and corresponding with it key;
Steps A 2 ': described network software operator writes customer data base with described user account number and corresponding with it key, finishes the binding of described network software information and network software.
Described step B comprises that specifically described network software operator writes intelligent key apparatus with described network software information, finishes the binding of described network software and described intelligent key apparatus.
Described step B comprises that specifically described network software agents merchant writes intelligent key apparatus with described network software information, finishes the binding of described network software and described intelligent key apparatus.
Before writing intelligent key apparatus with described network software information, described network software agents merchant comprises also that described network software agents merchant obtains described user account number and corresponding with it key step from described network software operator.
Described step C specifically comprises:
C1: the user uses and corresponding PIN code of intelligent key apparatus or biological characteristic, obtains the authentication of the legal holder's identity of described intelligent key apparatus;
C2: network software server by utilizing key authentication mechanism verifies that to the key in the described intelligent key apparatus after checking was passed through, the user obtained to use the qualification of described network software.
Described step C2 is that network software server by utilizing asymmetric key mechanisms is verified the key in the described intelligent key apparatus, and after checking was passed through, the user obtained to use the qualification of described network software.
Described step C2 verifies to the key in the described intelligent key apparatus that for network software server by utilizing impact/response mechanism after checking was passed through, the user obtained to use the qualification of described network software.
Described network software is online game software, Web education software or network media program-requesting software.
Described intelligent key apparatus is stored at least one network software information.
Described intelligent key apparatus is connected with computer by USB interface.
The present invention also provides a kind of device that improves the network software safety in utilization, and described device comprises network software information generating module, network software information writing module, network software information binding module, authenticating user identification module;
Described network software information generating module is used for network software operator and generates network software information;
Described network software information writing module is used for network software operator the network software information that described network software information generating module generates is write customer data base, finishes the binding of network software information and network software;
Described network software information binding module is used for the network software information that described network software information generating module generates is write intelligent key apparatus, finishes the binding of network software and intelligent key apparatus;
Described authenticating user identification module is used for the user and uses the intelligent key apparatus through described network software information binding module binding to carry out authentication, if authentication is passed through, the user obtains to use the qualification of network software.
Described network software information generating module comprises user account number generation unit and key generation unit;
Described user account number generation unit is used for network software operator and generates user account number;
Described key generation unit is used for network software operator and generates the corresponding key of user account number that generates with described user account number generation unit.
Described network software information binding module comprises that network software operator binding unit and network software agents merchant bind the unit;
Described network software operator binding unit is used for network software operator the network software information that described network software information generating module generates is write intelligent key apparatus, finishes the binding of network software and intelligent key apparatus;
Described network software agents merchant binds the unit and is used for the network software agents merchant network software information that described network software information generating module generates is write intelligent key apparatus, finishes the binding of network software and intelligent key apparatus.
Adopt the technical scheme of the present invention to have simplified the flow process of user when using network software, improved the user and obtained the competency for operation process safe of network software, network software convenient for users in the mode of utilizing authentication.
Description of drawings
Fig. 1 is the flow chart of the embodiment of the invention 1;
Fig. 2 is the flow chart of the embodiment of the invention 2;
Fig. 3 is the flow chart that adopts the asymmetric key cipher system to carry out authentication;
Fig. 4 is the flow chart that adopts the HMAC-Hash algorithm to carry out authentication;
Fig. 5 is the structure drawing of device that improves the network software safety in utilization.
Embodiment
The invention will be further described below in conjunction with the drawings and specific embodiments, but not as a limitation of the invention.
In today of the Internet high speed development, online game software, Web education software or network media program-requesting software have obtained using widely, and they have not only brought happy to daily life, and make people obtain knowledge.But most online game software, Web education software or network media program-requesting software all are paywares, generally adopt user account number and with it the mode of corresponding password verify whether the user is legal user.This verification mode has brought opportunity for some network crime molecules, and they utilize the system vulnerability of user's computer, computer virus are implanted in user's the computer for example various trojan horses, worm-type virus etc.When the user inputs user account number and with it corresponding password the time, computer virus can automatically write down the user account number of user's input and the password of correspondence with it, and the form with Email sends in the E-mail address of network crime molecule then.Network crime molecule uses the user account number and the corresponding with it password that obtain to login corresponding website modification password, makes real user to login.
Online game has at present had a large amount of players, for example grand recreation, and after the player reaches certain rank, can obtain a large amount of virtual equipments.Sometimes the player must have the outpost of the tax office that certain virtual equipment just can waltz through game settings.User account number and the with it corresponding password of network crime molecule by stealing others, and then obtain virtual equipment, then virtual equipment is sold the player who needs, reach the purpose of therefrom making a profit.Adopt technical scheme of the present invention, can prevent effectively that game player's user account number and corresponding with it password are stolen.Be example with the online game software that has a large amount of users at present below, set forth technical scheme of the present invention.
Embodiment 1
Referring to Fig. 1, present embodiment is a kind of method of utilizing intelligent key apparatus to obtain to use the qualification of online game software safely, this method can be divided into according to the executor who finishes the binding intelligent key apparatus that online game software operation merchant binds intelligent key apparatus and online game ageng merchant binds intelligent key apparatus, and the concrete steps that online game software operation merchant binds intelligent key apparatus comprise:
Step 101: online game software operation merchant generates user account number;
Step 102: online game software operation merchant obtains intelligent key apparatus from the hardware manufacturer;
Step 103: online game software operation merchant is at inner generation of the intelligent key apparatus that obtains and the corresponding key of user account number;
Step 104: online game software operation merchant writes customer data base with user account number and the corresponding with it key that generates, and finishes the binding with online game software of user account number and corresponding with it key;
Step 105: online game software operation merchant writes intelligent key apparatus with the user account number that generates, and finishes the binding of online game software and intelligent key apparatus;
Step 106: online game software operation merchant will finish user account number and with it the intelligent key apparatus of corresponding key bindings transfer to online game ageng merchant and sell;
Step 107: users from networks Games Software agent place gets access to the intelligent key apparatus of finishing binding;
Step 108: the user utilizes the intelligent key apparatus of having finished binding to carry out authentication;
Step 109: authentication is passed through, and the user obtains to use the qualification of online game software.
Embodiment 2
Referring to Fig. 2, present embodiment is a kind of method of utilizing intelligent key apparatus to obtain to use the qualification of online game software safely, this method can be divided into according to the executor who finishes the binding intelligent key apparatus that online game software operation merchant binds intelligent key apparatus and online game ageng merchant binds intelligent key apparatus, and the concrete steps that online game ageng merchant binds intelligent key apparatus comprise;
Step 201: online game software operation merchant generates user account number and corresponding with it key;
Step 202: online game software operation merchant writes customer data base with user account number and the key corresponding with it that generates, and finishes the binding with online game software of user account number and key corresponding with it;
Step 203: online game ageng merchant obtains intelligent key apparatus from the hardware manufacturer;
Step 204: online game ageng merchant will write intelligent key apparatus from user account number and the key corresponding with it that online game software operation merchant obtains, and finish the binding of online game software and intelligent key apparatus;
Step 205: users from networks Games Software agent place gets access to the intelligent key apparatus of finishing binding;
Step 206: the user utilizes the intelligent key apparatus of having finished binding to carry out authentication;
Step 207: authentication is passed through, and the user obtains to use the qualification of online game software.
Intelligent key apparatus among the embodiment 1 and 2 is connected with computer by USB interface, and can store the account number of at least one online game software and corresponding with it key in the intelligent key apparatus.
Referring to Fig. 3, step 108 among the embodiment 1 and and embodiment 2 in the described user of step 206 utilize the intelligent key apparatus of having finished binding to carry out authentication can to adopt asymmetric key cipher system or HMAC-Hash algorithm to carry out, adopt the concrete steps of asymmetric key cipher system authentication to comprise:
Step 301: the user is connected to computer with intelligent key apparatus;
Step 302: the user imports PIN code;
Step 303: whether the PIN code of checking user input is correct, if correct execution step 304, otherwise prompting makes mistakes;
Step 304: the user verifies by PIN code, confirms as the legal holder of intelligent key apparatus, logging in network Games Software operator website, the online game different according to required selection;
Step 305: after the recreation of user's selected network, network game server end produces a random string and sends to intelligent key apparatus by client;
Step 306: intelligent key apparatus utilizes key that random string is carried out digital signature;
Step 307: intelligent key apparatus returns to network game server end by client with digital signature;
Step 308: the public key verifications digital signature that the network game server end utilization is corresponding with it, if checking is correct, then execution in step 309, otherwise prompting makes mistakes;
Step 309: the user obtains to enter the qualification of selected network recreation, becomes the player of this recreation.
Referring to Fig. 4, the described user of step 206 among step 108 among the embodiment 1 and the embodiment 2 utilizes the intelligent key apparatus of having finished binding to carry out authentication and can adopt asymmetric key cipher system or HMAC-Hash algorithm to authenticate, adopt the concrete steps of HMAC-Hash algorithm authentication to comprise:
Step 401: the user is connected to computer with intelligent key apparatus;
Step 402: the user imports PIN code;
Step 403: whether the PIN code of checking user input is correct, if correctly then execution in step 404, otherwise prompting makes mistakes;
Step 404: the user verifies by PIN code, confirms as the legal holder of intelligent key apparatus, logging in network Games Software operator, the online game different according to required selection;
Step 405: after the recreation of user's selected network, network game server end produces a random string and sends to intelligent key apparatus by client;
Step 406: intelligent key apparatus utilizes key and HMAC-Hash algorithm that random string is calculated, and obtains the A that makes a summary, and returns to network game server end by client;
Step 407: network game server end utilizes key and HMAC-Hash algorithm that the random string of its generation is calculated, and obtains the B that makes a summary;
Step 408: relatively whether A is identical with B for network game server end, if identical, then carry out step 409, otherwise prompting makes mistakes;
Step 409: the user obtains to enter the qualification of selected network recreation, becomes the player of this recreation.
Confirm the user for the legal holder of intelligent key apparatus except the mode that adopts the input PIN code and verify, can also adopt the mode of retina scanning or finger scan to verify.
Referring to Fig. 5, the present invention also provides a kind of device that improves the network software safety in utilization, and device comprises network software information generating module 501, network software information writing module 502, network software information binding module 503, authenticating user identification module 504;
Network software information generating module 501 is used for network software operator and generates network software information;
Network software information writing module 502 is used for network software operator the network software information that network software information generating module 501 generates is write customer data base, finishes the binding of network software information and network software;
Network software information binding module 503 is used for the network software information that network software information generating module 501 generates is write intelligent key apparatus, finishes the binding of network software and intelligent key apparatus;
Authenticating user identification module 504 is used for the user and uses the intelligent key apparatus through 503 bindings of network software information binding module to carry out authentication, if authentication is passed through, the user obtains to use the qualification of network software.
Network software information generates 501 of moulds and comprises user account number generation unit and key generation unit;
The user account number generation unit is used for network software operator and generates user account number;
The key generation unit is used for network software operator and generates the corresponding key of user account number that generates with the user account number generation unit.
Network software information binding module 503 comprises that network software operator binding unit and network software agents merchant bind the unit;
Network software operator binding unit is used for network software operator the network software information that the network software information generating module generates is write intelligent key apparatus, finishes the binding of network software and intelligent key apparatus;
The network software agents merchant binds the unit and is used for the network software agents merchant network software information that the network software information generating module generates is write intelligent key apparatus, finishes the binding of network software and intelligent key apparatus.
Above-described embodiment is a more preferably embodiment of the present invention, and common variation that those skilled in the art carries out in the technical solution of the present invention scope and replacement all should be included in protection scope of the present invention.

Claims (16)

1. a method that improves the network software safety in utilization is characterized in that, said method comprising the steps of:
Steps A: network software operator generates network software information, and it is write customer data base, finishes the binding of described network software information and network software;
Step B: described network software information is write intelligent key apparatus, finish the binding of described network software and described intelligent key apparatus;
Step C: the user uses the described intelligent key apparatus of having finished binding to carry out authentication, obtains to use the qualification of described network software.
2. the method for raising network software safety in utilization as claimed in claim 1 is characterized in that, described network software information comprises user account number and corresponding with it key.
3. the method for raising network software safety in utilization as claimed in claim 2 is characterized in that, described steps A specifically comprises:
Steps A 1: network software operator generates described user account number;
Steps A 2: described network software operator generates and the corresponding key of described user account number in that described intelligent key apparatus is inner;
Steps A 3: described network software operator writes customer data base with described user account number and corresponding with it key, finishes the binding of described network software information and network software.
4. the method for raising network software safety in utilization as claimed in claim 2 is characterized in that, described steps A specifically comprises:
Steps A 1 ': network software operator generates described user account number and corresponding with it key;
Steps A 2 ': described network software operator writes customer data base with described user account number and corresponding with it key, finishes the binding of described network software information and network software.
5. the method for raising network software safety in utilization as claimed in claim 1, it is characterized in that, described step B comprises that specifically described network software operator writes intelligent key apparatus with described network software information, finishes the binding of described network software and described intelligent key apparatus.
6. the method for raising network software safety in utilization as claimed in claim 1, it is characterized in that, described step B comprises that specifically described network software agents merchant writes intelligent key apparatus with described network software information, finishes the binding of described network software and described intelligent key apparatus.
7. the method for raising network software safety in utilization as claimed in claim 6, it is characterized in that, comprised also that before described network software agents merchant writes intelligent key apparatus with described network software information described network software agents merchant obtains described user account number and corresponding with it key step from described network software operator.
8. the method for raising network software safety in utilization as claimed in claim 1 is characterized in that, described step C specifically comprises:
C1: the user uses and corresponding PIN code of intelligent key apparatus or biological characteristic, obtains the authentication of the legal holder's identity of described intelligent key apparatus;
C2: network software server by utilizing key authentication mechanism verifies that to the key in the described intelligent key apparatus after checking was passed through, the user obtained to use the qualification of described network software.
9. the method for raising network software safety in utilization as claimed in claim 8, it is characterized in that, described step C2 is that network software server by utilizing asymmetric key mechanisms is verified the key in the described intelligent key apparatus, after checking was passed through, the user obtained to use the qualification of described network software.
10. the method for raising network software safety in utilization as claimed in claim 8, it is characterized in that, described step C2 verifies the key in the described intelligent key apparatus for network software server by utilizing impact/response mechanism, after checking was passed through, the user obtained to use the qualification of described network software.
11. the method as any described raising network software of the claim safety in utilization among the claim 1-10 is characterized in that described network software is online game software, Web education software or network media program-requesting software.
12. the method as any described raising network software of the claim safety in utilization among the claim 1-10 is characterized in that described intelligent key apparatus is stored at least one network software information.
13. the method as any described raising network software of the claim safety in utilization among the claim 1-10 is characterized in that described intelligent key apparatus is connected with computer by USB interface.
14. a device that improves the network software safety in utilization is characterized in that, described device comprises network software information generating module, network software information writing module, network software information binding module, authenticating user identification module;
Described network software information generating module is used for network software operator and generates network software information;
Described network software information writing module is used for network software operator the network software information that described network software information generating module generates is write customer data base, finishes the binding of network software information and network software;
Described network software information binding module is used for the network software information that described network software information generating module generates is write intelligent key apparatus, finishes the binding of network software and intelligent key apparatus;
Described authenticating user identification module is used for the user and uses the intelligent key apparatus through described network software information binding module binding to carry out authentication, if authentication is passed through, the user obtains to use the qualification of network software.
15. the device of raising network software safety in utilization as claimed in claim 14 is characterized in that, described network software information generating module comprises user account number generation unit and key generation unit;
Described user account number generation unit is used for network software operator and generates user account number;
Described key generation unit is used for network software operator and generates the corresponding key of user account number that generates with described user account number generation unit.
16. the device of raising network software safety in utilization as claimed in claim 14 is characterized in that, described network software information binding module comprises that network software operator binding unit and network software agents merchant bind the unit;
Described network software operator binding unit is used for network software operator the network software information that described network software information generating module generates is write intelligent key apparatus, finishes the binding of network software and intelligent key apparatus;
Described network software agents merchant binds the unit and is used for the network software agents merchant network software information that described network software information generating module generates is write intelligent key apparatus, finishes the binding of network software and intelligent key apparatus.
CN 200610113134 2006-09-15 2006-09-15 Method and device for improving utilization security of network software Pending CN1925395A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 200610113134 CN1925395A (en) 2006-09-15 2006-09-15 Method and device for improving utilization security of network software

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 200610113134 CN1925395A (en) 2006-09-15 2006-09-15 Method and device for improving utilization security of network software

Publications (1)

Publication Number Publication Date
CN1925395A true CN1925395A (en) 2007-03-07

Family

ID=37817886

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 200610113134 Pending CN1925395A (en) 2006-09-15 2006-09-15 Method and device for improving utilization security of network software

Country Status (1)

Country Link
CN (1) CN1925395A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101051908B (en) * 2007-05-21 2011-05-18 北京飞天诚信科技有限公司 Dynamic cipher certifying system and method
CN101588351B (en) * 2008-05-21 2012-06-27 飞天诚信科技股份有限公司 Method for information security device for binding network software
CN102571339A (en) * 2010-12-31 2012-07-11 上海格尔软件股份有限公司 Virtual asset protection method based on intelligent key and digital signature
CN104394170A (en) * 2014-12-11 2015-03-04 大唐微电子技术有限公司 Security account using method, safety device, server and system
CN105187219A (en) * 2015-09-30 2015-12-23 山东信通电子股份有限公司 Method for preventing tampering of identity information in real name authentication

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101051908B (en) * 2007-05-21 2011-05-18 北京飞天诚信科技有限公司 Dynamic cipher certifying system and method
CN101588351B (en) * 2008-05-21 2012-06-27 飞天诚信科技股份有限公司 Method for information security device for binding network software
CN102571339A (en) * 2010-12-31 2012-07-11 上海格尔软件股份有限公司 Virtual asset protection method based on intelligent key and digital signature
CN102571339B (en) * 2010-12-31 2014-12-17 上海格尔软件股份有限公司 Virtual asset protection method based on intelligent key and digital signature
CN104394170A (en) * 2014-12-11 2015-03-04 大唐微电子技术有限公司 Security account using method, safety device, server and system
CN105187219A (en) * 2015-09-30 2015-12-23 山东信通电子股份有限公司 Method for preventing tampering of identity information in real name authentication
CN105187219B (en) * 2015-09-30 2018-11-23 山东信通电子股份有限公司 The anti-tamper method of identity information in real-name authentication

Similar Documents

Publication Publication Date Title
CN1156785C (en) Electronic data management system
CN2667807Y (en) Network bank with device for encrypting and idetificating utilizing USB key
CN1409836A (en) Computer system for application by accreditation access
CN100335989C (en) User certification apparatus and user certification method
CN1682204A (en) Certification processing hardware, certification processing system and use management hardware
EP1352677A3 (en) Gaming software authentication
CN109583181A (en) A kind of authentication method, device and machine readable storage medium
CN101047503A (en) Method and system for fetching cipher
CN1445693A (en) Safety digital data form and code forced implement policy
CN1744100A (en) Licensing the use of software to a particular user
CN1977256A (en) Remote access system, gateway, client device, program, and storage medium
CN1929381A (en) Network based software protection method
CN1582422A (en) Method to protect software against unauthorized use
US9264417B2 (en) Method and apparatus for generating a security token carrier
CN101075358A (en) Authentication device, authentication system, and verification method for authentication device
CN1925395A (en) Method and device for improving utilization security of network software
CN103455965A (en) Verification image based verification method, device and server
CN109033808B (en) Game experience method and account server
CN102739667A (en) Verification method, device and system based on verification prompt message and server
CN1822541A (en) Device and method for controlling computer access
CN101034985A (en) Method and system for the anti-counterfeit of the mobile phone with the dynamic code
CN1925396A (en) Method and device for improving utilization security of network information product
CN101286846B (en) Interactive identity authentication method
CN1956374A (en) Device and method for providing data encipher to identity authentication
CN108171018B (en) Software encryption and decryption method for vehicle-mounted decoder

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20070307