KR20110121198A - Method for blocking internet access by selected pc service - Google Patents
Method for blocking internet access by selected pc service Download PDFInfo
- Publication number
- KR20110121198A KR20110121198A KR1020100040682A KR20100040682A KR20110121198A KR 20110121198 A KR20110121198 A KR 20110121198A KR 1020100040682 A KR1020100040682 A KR 1020100040682A KR 20100040682 A KR20100040682 A KR 20100040682A KR 20110121198 A KR20110121198 A KR 20110121198A
- Authority
- KR
- South Korea
- Prior art keywords
- designated
- information
- service
- user
- cpu
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/101—Access control lists [ACL]
Abstract
The present invention relates to a method for blocking access to the Internet through a designated PC service, and more particularly, to select a PC for accessing an Internet site and to determine whether the designated PC is to access an Internet site with only that PC. And a method for blocking access to the Internet through a designated PC service using IP information.
To this end, the present invention receives a designated PC service requesting access to an Internet site provided by the server only with a designated PC of a user registered in the server through a wired / wireless network and from a designated PC of the user who requested the designated PC service. And extracting the information of the CPU to generate the designated PC information, and registering the designated PC information and the IP address of the designated PC in a designated PC database and, when a login request is made to the Internet site, the designated PC service. If the requested user extracts the HDD and CPU information of the logged-in PC and generates login PC information, compares the registered designated PC information with the login PC information, and compares the registered IP address with the IP address of the logged-in PC. Comparing and if the comparison result is not the same, the step of blocking access of the logged-in user, and The designated PC information and the login PC information are generated by at least one of a cyclic redundancy check 32 (CRC32) and a message-digest algorithm 5 (MD5) using the serial number of the HDD and the CPU ID of the CPU.
Accordingly, by using the IP address and hardware information to create a new type of information that can determine the user PC to maximize the anti-theft effect.
Description
The present invention relates to a method for blocking access to the Internet through a designated PC service, and more particularly, to select a PC for accessing an Internet site and to determine whether the designated PC is to access an Internet site with only that PC. And a method for blocking access to the Internet through a designated PC service using IP information.
Currently, various web services are provided online for users. The web service uses a user authentication step called login to identify and authenticate a member, allow access to various web services suitable for the member's authority, use a web service, and generate content.
Various web services through user authentication are used in news portal services, email services, community services, blog services, and internet games, and individual users use various web services online.
Web service providers also have a large number of users as members, and provide various web services suitable for the rights of the members. However, in order to provide a smooth web service, the rights of the members must be smoothly provided, while the privacy and security of the members must also be maintained. In other words, if the user authentication is successful in providing the web service, there should be no inconvenience in using the authority for the member during a specific session, but security should be maintained in access to the web service requiring the user authentication.
In the related art, in order to maintain security, a session cookie is used to maintain a user's session and provide a web service. Session cookies typically contain a variety of personal information, such as user ID, e-mail, name, date of birth, gender, real name, etc. The session cookie can be used by hackers or the like to steal intermediate packets. There is a problem that is likely to be seized by an illegal user.
Recently, IP address or MAC address is used together with security. However, the method of maintaining security by using IP address and MAC address also does not provide an effective alternative because there is a risk of theft of IP address and MAC address.
SUMMARY OF THE INVENTION The present invention has been made to solve the above problems, and an object of the present invention is to provide a method and a server for preventing theft by generating a new type of information for identifying a user PC using an IP address and hardware information. have.
Internet access blocking method through a designated PC service according to the present invention for achieving the above object requires a designated PC service that can access the Internet site provided by the server only to the designated PC of the user registered in the server through a wired or wireless network Receiving step and extracting the information of the HDD and CPU from the designated PC of the user who requested the designated PC service to generate the designated PC information, and registering the designated PC information and the IP address of the designated PC in the designated PC database; If there is a login request to the Internet site, the user who requested the designated PC service extracts the HDD and CPU information of the logged-in PC and generates login PC information to display the registered designated PC information and the login PC information. Comparing and comparing the registered IP address with the IP address of the logged-in PC; and the comparison result is the same And disconnecting the logged-in user, wherein the designated PC information and the login PC information are included in the CRC32 (Cyclic Redundancy Check 32) and MD5 (Message-) using the serial number of the HDD and the CPU ID of the CPU. Digest algorithm 5) is generated by at least one method.
According to the Internet access blocking method through the designated PC service according to the present invention,
First, by using the IP address and hardware information to create a new type of information that can determine the user PC to maximize the anti-theft effect.
Second, since it is possible to set several designated PCs, it is possible to register and use all the PCs used as designated PCs, thus providing high convenience.
Third, foreign hackers can bypass bypass.
1 is a functional block diagram of a server blocking Internet access through a designated PC service,
2 is a table showing an embodiment of a method for generating designated PC information;
3 is a flowchart illustrating a method for blocking access to the Internet through a designated PC service,
4A to 4D are diagrams illustrating an embodiment of exposing a designated PC service on an Internet site.
Hereinafter, exemplary embodiments of the present invention will be described in detail with reference to the accompanying drawings. Prior to this, terms or words used in the present specification and claims should not be construed as being limited to the common or dictionary meanings, and the inventors should properly explain the concept of terms in order to best explain their own invention. Based on the principle that it can be defined, it should be interpreted as meaning and concept corresponding to the technical idea of the present invention.
Therefore, the embodiments described in the specification and the drawings shown in the drawings are only the most preferred embodiment of the present invention and do not represent all of the technical idea of the present invention, various modifications that can be replaced at the time of the present application It should be understood that there may be equivalents and variations.
FIG. 1 is a functional block diagram of a server for blocking internet access through a designated PC service. Referring to the drawings, a server for blocking internet access through a designated PC service will be described.
The
First, the designated PC service
The designated PC
As shown in FIG. 2, the designated PC
The
As shown in the table of FIG. 2, the
On the other hand, when the user accesses the Internet site and logs in, the
The designated
The comparison result of the designated
In addition, the server may further include a connection blocking
In addition, the
3 is a flowchart illustrating a method for blocking access to the Internet through a designated PC service, and with reference to the drawings, a method for blocking access to the Internet through a designated PC service will be described.
When the user requests the designated PC service (S10) and generates the designated PC information and stores the specified PC information and IP address in the designated PC database (S20). The designated
4A to 4D are diagrams showing an embodiment of exposing a designated PC service on an Internet game site. Since the designated PC service has a high anti-theft effect, not only the Internet game site but also an email service, a community service, etc., which have a high necessity of anti-theft. It is also available on the provided Internet site.
As described above, although the present invention has been described by way of limited embodiments and drawings, the present invention is not limited thereto and is intended by those skilled in the art to which the present invention pertains. Of course, various modifications and variations are possible within the scope of equivalents of the claims to be described.
100
120 Designated
140 Designated
160
200 Designated
310
330
Claims (1)
Extracting information on the HDD and CPU from the designated PC of the user who requested the designated PC service to generate designated PC information, and registering the designated PC information and the IP address of the designated PC in a designated PC database;
If there is a login request to the Internet site, the user who requested the designated PC service extracts the HDD and CPU information of the logged-in PC and generates login PC information to display the registered designated PC information and the login PC information. Comparing and comparing the registered IP address with the IP address of the logged-in PC; And
Blocking the access of the logged-in user if the comparison result is not the same;
The designated PC information and the login PC information,
A method for blocking access to the Internet through a designated PC service generated by at least one of a cyclic redundancy check 32 (CRC32) and a message-digest algorithm 5 (MD5) using a serial number of a HDD and a CPU ID of a CPU.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020100040682A KR20110121198A (en) | 2010-04-30 | 2010-04-30 | Method for blocking internet access by selected pc service |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020100040682A KR20110121198A (en) | 2010-04-30 | 2010-04-30 | Method for blocking internet access by selected pc service |
Publications (1)
Publication Number | Publication Date |
---|---|
KR20110121198A true KR20110121198A (en) | 2011-11-07 |
Family
ID=45392112
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
KR1020100040682A KR20110121198A (en) | 2010-04-30 | 2010-04-30 | Method for blocking internet access by selected pc service |
Country Status (1)
Country | Link |
---|---|
KR (1) | KR20110121198A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR101333006B1 (en) * | 2012-07-12 | 2013-11-26 | 주식회사 잉카인터넷 | System and method of confirming a login |
-
2010
- 2010-04-30 KR KR1020100040682A patent/KR20110121198A/en not_active Application Discontinuation
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR101333006B1 (en) * | 2012-07-12 | 2013-11-26 | 주식회사 잉카인터넷 | System and method of confirming a login |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7836121B2 (en) | Dynamic executable | |
US9009463B2 (en) | Secure delivery of trust credentials | |
CN104519042B (en) | Detect and prevent the man-in-the-middle attack on encryption connection | |
US9485246B2 (en) | Distributed authentication with data cloud | |
US8850219B2 (en) | Secure communications | |
KR101005910B1 (en) | Method and apparatus for providing trusted single sign-on access to applications and internet-based services | |
US8220032B2 (en) | Methods, devices, and computer program products for discovering authentication servers and establishing trust relationships therewith | |
US8893244B2 (en) | Application-based credential management for multifactor authentication | |
US10187373B1 (en) | Hierarchical, deterministic, one-time login tokens | |
US8869258B2 (en) | Facilitating token request troubleshooting | |
US20100100950A1 (en) | Context-based adaptive authentication for data and services access in a network | |
JP2017517823A (en) | Techniques for operating services with machine-generated authentication tokens | |
CN109450633B (en) | Information encryption transmission method and device, electronic equipment and storage medium | |
KR20120085760A (en) | Modular device authentication framework | |
US20230370265A1 (en) | Method, Apparatus and Device for Constructing Token for Cloud Platform Resource Access Control | |
JP2019220238A (en) | Computer readable storage media for legacy integration and method and system for utilizing the same | |
US9954853B2 (en) | Network security | |
Klevjer et al. | Extended HTTP digest access authentication | |
US8875244B1 (en) | Method and apparatus for authenticating a user using dynamic client-side storage values | |
US9621546B2 (en) | Method of generating one-time password and apparatus for performing the same | |
TW201430608A (en) | Single-sign-on system and method | |
US11252143B2 (en) | Authentication system, authentication server and authentication method | |
JP2014215853A (en) | Authentication system and authentication method | |
Huang et al. | A method for trusted usage control over digital contents based on cloud computing | |
JP5161053B2 (en) | User authentication method, user authentication system, service providing apparatus, and authentication control apparatus |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WITN | Withdrawal due to no request for examination |