TWM422717U - Network login security equipment - Google Patents

Network login security equipment Download PDF

Info

Publication number
TWM422717U
TWM422717U TW100217449U TW100217449U TWM422717U TW M422717 U TWM422717 U TW M422717U TW 100217449 U TW100217449 U TW 100217449U TW 100217449 U TW100217449 U TW 100217449U TW M422717 U TWM422717 U TW M422717U
Authority
TW
Taiwan
Prior art keywords
user
answer
unit
question
security
Prior art date
Application number
TW100217449U
Other languages
Chinese (zh)
Inventor
Hung-Yu Chen
Chun-Yin Liu
Original Assignee
Hung-Yu Chen
Chun-Yin Liu
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hung-Yu Chen, Chun-Yin Liu filed Critical Hung-Yu Chen
Priority to TW100217449U priority Critical patent/TWM422717U/en
Publication of TWM422717U publication Critical patent/TWM422717U/en

Links

Description

M422717 五、新型說明: 【新型所屬之技術領域】 本創作係有關-種女全si借,特別是提供—種網路登人之安全設備。 【先前技術】 由於近來鹏病毒、1¾客程式與釣魚簡盛行,個者極為容易遭受 木馬病毒程式、魅程式等攻擊’―旦這些攻擊滲透X侵個人電腦或是企 業伺服S ’所V來之扣失往往無法估計;再者,使用者也常因誤入釣魚網 頁而茂漏個人資訊、登人密碼、或是信用卡、金融卡等資訊而遭到竊取或 目用身又而5 ’由於防毒技術日益進步,優良的防毒軟體、防火牆4實 能夠杜絕大部分電腦病毒、木馬財、以及喊程式的危害,然而,釣魚 網頁卻讓使用者防不勝防。 .不、,J路的便㈣亚非人人都有相當之資訊安全概念,同時對方 潛在危害的察覺程度也因人㈣,相使財—時之疏忽,或是釣魚網1 之"面過於相域是精良,導致使用者不疑有麵將個人機密資訊或是巷 碼W光,#使W覺…自身之_已_害。_魚網頁' 網站,最她⑽卻並雜毒軟體本身,心於使赌咖方綱 覺性’因此,如何提供纽的安全機_不仰賴伽者自身來防範釣备縮 頁’即為重要之課題。 在目__ '網㈣湖巾,输細輪式來防範釣 β/、使轉端設備,則必須蘭提供或是設定安蝴章,如此 。不方便。㈣種模式而言,釣魚網頁—樣能夠模仿並進而竊取使用者登 M422717 入資訊冑鏗於此’如何提供安全之登入防護機制即為相關業者所亟欲思 考之問題。 【新型内容】 本創作提出-種網路登入安全設備,包含伺服器'條件式驗證模組及 資料庫’其中伺服益藉由網際網路連接使用者終端設備;條件式驗證模組 安裝於舰器’肋透過崎網路触賴者終端設備於登人伺服器所屬 之網站時’湘在條件式驗證模組之操作介面岐行操作與防護,條件式 驗。道”且包3輸人使用者帳狀帳號輸人單元、輸人顧者密碼之密碼輸 入早70及自訂問答單元,自訂問答單元為要求賴者自訂登人_之提問 與解合’藉由解答相對應符合提問之解答時,得以驗證使用者並讓使用者 、周站操作資料庫係連接於伺服器並用以儲存條件式驗證模組之資料。 本創作藉由條件式驗證模組之自訂問答單元要求使用者自訂登入網站 之提問與解答’藉由解答姆應符合制之解答,才能夠驗證伽者並讓 使用者登人網站操作,形同一把使用者自訂之錄匙,以此來進_步確實防 止使用者因不慎茂漏個人登人資訊於釣魚網頁,而被骇客人侵導致個人權 益的損害。 以下在貫施方式中詳細敘述本創作之詳細特徵以及優點,其内容足以 使任何熱習相關技藝者瞭解本創作之技術内容並據以實*,且根據本說明 曰所揭路之内容、中請專利範圍及圖式,任何熟習相關技藝者可輕易地理 解本創作相關之目的及優點。 【實施方式】 請參照第1圓及第2圖,第】圖為架構示意圖,第2圖為方塊示意圖。 30 網路登入安全設備丨包含:健器1G、條件式驗證模組扣 及資料庫 伺服器10II由網際網路連接使用者終端設僙9〇。纽,伺服器1〇更 包含安全驗證糢組101,當使用者登入並進行買賣、上傳、下載、變更 個人貝訊、登入密碼、提問或解答等時,可藉由安全驗證模組101加以驗 v執行私序。本具她例之安全驗證模组1〇1可以是數位憑證簽章或 金錄等方式進行驗證。 條件式H吴組20安裝於伺服器1〇,用以透過網際網路接收使用者 、怎又傷90於登入伺服器1〇所屬之網站時’利用在條件式驗證模組如之 :、面1内進订操作與防護,條件式驗證模組20包含帳號輸入單元22、 密碼輸入單元23及自訂問科元24。 帳逮輸入單凡22為使用者用以輸入登入帳號區域。 您馬輸入單元23為使用者用以輸人登人密碼區域。 單元24要求使用者自訂登人網站時必須提出之提問與相對 應提問的解答,藉由解答相對應符合提問之解答時,得以驗證使用者並讓 使用者登人_操作。在此,提問與解答難地為文字、Μ、圖稽 '數 位簽章後的檔案或是錢,但實際使料,不以此為限。而解答較佳地以 透過輸入或上傳等方式傳至伺服器10。 丁門。早7L 24更包含進階設定單元24卜用以設定二個以上的提問 時,複紐_呈現雜作介面2丨嶋倾式或是順序等。 條件式驗證模組2〇在此實施例更包含登入條件單元25,提供使用者 自訂登入條件並加以選擇與驗證。條件式驗證模⑽在此實施例更包含容 5 M422717 錯率記算單元26,提供界定使用者提出之解答之錯誤率的標準。 資料庫30係連接於舰器10,資料庫3〇並用以健缺用者在條件式 驗證模組20所輸入之資料。 本創作之網路登入安全設備1更包含管理者終端設備80,連接舰器 10亚對於使用者輸人自訂·單元24之财時進行評估。 請參照第3圖、第4圖及第5圖,第3圖為操作介面示意圖㈠,第4 圖雜福_(:),帛5晴獅蝴。输者登入網頁並 進仃安全驗證的操作介面21及其過程說明。 使用者在使用者終端設備9〇登入飼服器10所屬之網站並註冊帳號 時’管理者終端設備_平台提供者如上述執行的行為要求使用者在 操作介面21之密碼輸入單元23訂定登人密碼,同時平台提供者仍會要求 使用者在條件式驗證模組20自訂登入安全之條件式,即要求使用者自訂其 登入之提問與解答。 使用者所訂定之登人提問會在每次者輸人登人密碼並且密碼通過 之後顯示’接著要求制者輸人姉應之解答,在此,提問出現的順序可 以是依序,亦可以故數方式決定出現之順序,但不以此為限。且每—個 提問與每-轉答均可以敎字 '密碼、_、數位鮮後_案或是金 錄等方式來運作,但不以此為限。 A特似明的疋’由於每—個提顺每—個解答皆為制者自訂,因此 當使用者輸人登人密顯發現網頁所顯_制並非自己所訂定的,即可 確認此網頁或是網站出現問題,極有可能為釣魚师,此時使用者則可適 時地登出網頁’並且再次確認其所登人的網頁或網站是否正確,從而進行 M422717 防範 然而’經由㈣的操作’登人密碼極可能已經遭人絲,啊之前出 現的提問也可能已經遭人發現顧仿,即便減,辦使財隨號仍有 问度的安全性’因為使用者自訂的提問與相對應之解答尚未遭到破解,然 而提問可以是—個’也可以是多個,制者可自㈣個制麵行防護’,' 越多提問或是提問與解答間的關聯性越低,其安全性則越高。 上述提問的順序可以是固定,也可以是變動的。平台提供者可依據對 於制所輸入對應的解答來進行評估、評判與把關,偶若所輸入的帳號與 4•入也碼為不肖人士所冒用’企圖登入並盜取利益,因為不是正確使用者, 所以其無法得知並提供職之解答,而無法破輕人辩,另—方面,; 時平台提供者會依據該非正確使用者所提供之解答的回答狀態,而在管2 端來決定是否要封鎖該帳號並且重新產生新的登入密碼,之後再將該新的 登入密妈寄予該帳戶使用者預設的通訊處,例如電子信箱或是任何聯絡方 式,平台提供者晴要求雜戶使用者重新以新的密碼登人並且再次變更 新的登人辦I、提問、與轉應之解答,以確保其帳戶安全。 抑當使用者正確地登入其帳號之後,若要進行各種安全性的操作,包括 貝士、買、上傳、下载’或是變更個人資訊、登入密碼、提問與解答等操作 時’本創作在飼服器10亦提供安全驗證模組1〇1來驗證上述執行的程序, 在龄全驗證龜1G1可峨㈣證、簽章、麵封絲崎魏,待 平台提供她f通敎後才允許其彳湯齡錄的齡,域可以完善 地提供多綱,輸_狀網輪梅備丨的安全性機2 有使用上的彈性。 M422717 /件式触2〇本村細M者自訂登场件,觀者所提供之 解。可以透過輸人或是上鮮方式傳至舰^⑴,若為正確之使用平台, 2會針對其職賴賴,哪H㈣驗證方式亦可 數位簽早麵、或是各種加解密的演算法’但不以此為限。 使用者自q·之條件式即為一把登入之矯匙在此,網路登入安全設備 易备的方式s將&把條件式之登人銳,透過觸對應解答的正確狀 况來進仃判項,.且因為考量了真正的使用者也會有輸人錯誤解答的狀況, 所以在條件式驗證模組2〇更包含容錯率記算單元%,並且在考量了一般 輸入錯稍純錯誤率並不會太高,除雜供解答的使用者為非法登入, 、、且之使用者會因無法提出正確解答而導致極高之問題錯誤率,即無 法正翻答制騎應之解答。因此容錯魏算單元%本身可界定出錯誤 標準值’齡_解答之錯誤率超職騎鮮值,财允許朗者登入 並且封鎖祕號,同時餘者密碼,透過賴者預朗通訊連絡 方式’例如郵件城、電話_、祕輕科予使用者,並要求使用者 重新以此舰生的登人密碼重新登人帳號再錢更其登人密碼 相對應之解答。 〃 網路登入安全設備1揭露之制者自訂條件摘安全機制,包含一項 施行的特點’即當使用者•對應於自訂制的解答時,#輸入錯誤時, ㈣介面21上不會提蝴者其峨人的為錯誤的解答,而是等到使用者 解答完所有自訂提問後再進行判讀,倘若高於前述錯誤標準值,即底於安 全容錯之醜齡告知制者紐成功登人並_練戶翻的好處在 於解答的類騎蚊料登人,也紐时贿誤的枝來細或是使 用暴力攻縣進行破_補應之解答。法登人者透靴#'方式取得 且入者帳H遭猶續的提問也只有—讀會進行解答的刺,因此錯 誤率大’便無祕人晴;«正使用者被告之親遭人嘗試料登入後, 即可自行再次進行制、解答、與登人密·變更,如此將能保障使用者 帳戶的安全性。 本創作之.鹏&人安全②備丨揭露之使壯自訂條件式的安全機制, 其安全性的高低取.決於使用者自訂之條件式,其一,者自訂之提問與 轉間的關聯性低,越不易被人破解;其二,使用者自訂的條件式越多, 安全性越高’細缺奴造成使用者登人時的不便,但是如何取決則決定 於使用者自身’使用者隨時可藉由自域件式財量輸人便繼來變更安 全性的高低。 平台提供者可以決定該些使財自訂之條件式的出現順序是否固定, 同時針對不同的需求與安全狀況進行調整;此外,提問與解答的驗證方式 也可視if ;兄進<了6膽’例如是針對文字、數字㈣進行比對;或是針對數 位簽早後的彳§案進彳了驗證簽章;也可以透過加解密的技術來驗證使用者所 提供之解。it、件式的彺返可以是_次性,也可以是多次性,倘若融合加 解松技* ’使用者端解台端也可赠過這種提問與解答⑽式傳遞加解 么過的減’再由後端的程式來進行演算,此皆為可行的應用方式。 ”’、、本創作的技術内容已經以較佳實施例揭露如上,然其並非用以限 疋本創作,任触fllb技藝者,林脫離本創作之精神所作些許之更動與 飾’心函现方、本創作的範嘴内,因此本創作之保護範圍當視後附之申 請專利範圍所界定者為準。 M422717 【圖式簡單說明】 第1圖為本創作之架構示意圖。 第2圖為本創作之方塊示意圖。 第3圖為本創作之操作介面示意圖(一)。 第4圖為本創作之操作介面示意圖(二)。 第5圖為本創作之步聚流程示意圖。 【主要元件符號說明】 1..............網路登入安全設備 10..............伺服器 101.............安全驗證模組 20 ..............條件式驗證模組 21 ..............操作介面 22 ..............帳號輸入單元 23 ..............密碼輸入單元 24 ..............自訂問答單元 241.............進階設定單元 25 ..............登入條件單元 26 ..............容錯率記算單元 30..............資料庫 80..............管理者終端設備 90..............使用者終端設備M422717 V. New description: [New technical field] This creation is related to the kind of female all-in-one, especially providing a kind of safety equipment for network access. [Prior Art] Due to the recent popularity of Peng virus, 13⁄4 guest programs and phishing, one is extremely vulnerable to attacks from Trojans, genius programs, etc. Loss is often impossible to estimate; in addition, users often steal or use personal information, passwords, or credit cards, financial cards, etc. due to mistakes in phishing pages. 5' The technology is getting more and more advanced. The excellent anti-virus software and firewall 4 can eliminate most of the computer viruses, Trojan horses, and shouting programs. However, the phishing website makes users unable to guard against it. No, J Road's (4) Asian and African people have a fairly information security concept, and the degree of potential harm of the other party is also due to people (four), the relatives of the money - the negligence of the time, or the fishing net 1 Too much phase is excellent, causing users to be suspicious of personal confidential information or lane code W light, #使W...self _ has been _. _ fish page 'website, the most she (10) but the toxic software itself, the heart is to make the gambling party's sense of 'however, how to provide New Zealand's security machine _ does not rely on the gambler itself to prevent fishing and shrinking pages' is important Question. In the __ 'net (four) lake towel, the thin wheel type to prevent fishing β /, to make the transfer equipment, you must provide or set the chapter, so. inconvenient. (4) In terms of models, phishing webpages can mimic and thus steal users' access to M422717. Here, how to provide a secure login protection mechanism is a question for the relevant industry. [New content] This creation proposes a kind of network login security device, including the server 'conditional verification module and database', wherein the servo benefits the user terminal device through the Internet; the conditional verification module is installed on the ship. When the device is used to access the server's website, the device is operated and protected by the operation interface of the conditional verification module. "Double" 3 input user account account input unit, loser password password input early 70 and custom Q & A unit, custom Q & A unit for the request of the person to customize the _ question and deconstruction 'When the answer is consistent with the answer to the question, the user is authenticated and the user, the weekly station operating database is connected to the server and used to store the information of the conditional verification module. The custom Q&A unit requires users to customize the question and answer on the login website. Recording key, in order to prevent users from accidentally leaking personal information on the phishing website, and being invaded by the guest, causing damage to personal rights. The detailed description of the creation is described in detail below. And the advantages, the content of which is sufficient for any entrants to know the technical content of the creation and according to the actual content, and according to the contents of the description, the scope of the patent and the schema, any The related art and the related art can easily understand the purpose and advantages of the present invention. [Embodiment] Please refer to the first circle and the second figure, the first diagram is the schematic diagram of the architecture, and the second diagram is the block diagram. 30 Network login security device丨 Included: Health 1G, Conditional Verification Module Deduction and Database Server 10II are set up by the Internet connection user terminal. The server 1 includes a security verification module 101. And when buying, selling, uploading, downloading, changing personal information, login password, questioning or answering, etc., the security verification module 101 can be used to perform the private sequence. The security verification module of the example can be used. It is verified by means of a digital certificate signature or a gold record. The conditional H-Wu group 20 is installed on the server 1 to receive the user through the Internet, and how to injure the website when logging in to the server 1 'Using in the conditional verification module such as:, in the face 1 ordering operation and protection, the conditional verification module 20 includes an account input unit 22, a password input unit 23, and a custom question element 24. 22 for the user Enter the login account area. Your horse input unit 23 is used by the user to enter the password area. Unit 24 requires the user to ask questions and answer the corresponding questions when answering the website. When the answer to the question is answered, the user can be authenticated and the user can be logged in. Here, the question and answer is difficult for the text, Μ, 图 ' 'digital signature after the file or money, but the actual material, The answer is preferably limited to the server 10 by inputting or uploading. Dingmen. The early 7L 24 further includes an advanced setting unit 24 for setting more than two questions. The presentation module 2 is configured to include a login condition unit 25 to provide a user-defined login condition and to select and verify the conditional verification module. (10) In this embodiment, a 5 M422717 error rate calculation unit 26 is further included, which provides a criterion for defining an error rate of a solution proposed by the user. The database 30 is connected to the vessel 10, and is used for the information entered by the conditional verification module 20 by the user. The network login security device 1 of the present invention further includes a manager terminal device 80, and the connection ship 10 is evaluated for the user's input of the custom unit. Please refer to Figure 3, Figure 4 and Figure 5, Figure 3 is a schematic diagram of the operation interface (1), Figure 4 is a hybrid _ (:), 帛 5 clear lion butterfly. The loser logs into the web page and enters the security verification operation interface 21 and its process description. When the user terminal device 9 logs in to the website to which the server 10 belongs and registers the account, the manager terminal device_the platform provider performs the behavior described above, and the user requests the user to enter the password input unit 23 of the operation interface 21. The user password, and the platform provider will still require the user to customize the login security condition in the conditional verification module 20, that is, the user is required to customize the question and answer of the login. The question of the user's appointment will be displayed after each time the person enters the password and the password is passed. Then the requester is asked to input the answer. Here, the order of the question can be in order, or The number method determines the order in which it appears, but is not limited to this. Each question and every-transfer can be operated by the words 'password, _, number of fresh _ cases or gold records, but not limited to this. A special-like 疋 'Because every one of the answers is a custom-made one, so when the user enters the person to find out that the page is displayed, it is not determined by the user If there is a problem with this webpage or the website, it is very likely that it is a fisherman. At this time, the user can log out of the webpage at the right time and reconfirm whether the webpage or website of the person who posted it is correct, so as to prevent M422717, however, via (4) The operation of the 'passenger password is very likely to have been human, ah, the question that has appeared before may have been found to be imitation, even if it is reduced, the security is still questionable security' because of user-defined questions and The corresponding answer has not been solved yet, but the question can be - 'or more than one, the system can protect from (four) control planes, 'the more questions or the lower the relevance between questions and answers, Its security is higher. The order of the above questions may be fixed or variable. The platform provider can evaluate, judge and check according to the corresponding input to the system, even if the entered account number and the 4 input code are also used by the unscrupulous person to attempt to log in and steal the interest, because it is not used correctly. Therefore, it is impossible to know and provide answers to the job, and it is impossible to break the argument. On the other hand, the platform provider will decide on the basis of the answer status of the answer provided by the incorrect user. Whether to block the account and regenerate a new login password, and then send the new login mom to the user's default communication office, such as e-mail or any contact method. The platform provider is required to use the account. The person who re-applied with a new password and updated again will answer the questions, ask questions, and respond to the answer to ensure the security of his account. After the user has correctly logged into his account, if he wants to perform various security operations, including bass, buy, upload, download, or change personal information, login password, question and answer, etc. The server 10 also provides a security verification module 1〇1 to verify the above-mentioned execution procedure, and the full-certification turtle 1G1 can be 峨(four) certificate, signature, face seal silky Wei, and only after the platform provides her f wanted The age of the Tang dynasty record, the domain can be perfect to provide multiple classes, the safety machine 2 of the _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ M422717 / Piece Touch 2 〇 This village is a custom M debut, the viewer provides the solution. It can be transmitted to the ship ^(1) through the input or the fresh way. If it is used correctly, 2 will be based on its responsibility, which H (four) verification method can also be digitally signed early, or various encryption and decryption algorithms' But not limited to this. The user's conditional form from q is the key to login. Here, the way to log in to the security device is easy and the condition will be sharpened. Judgment, and because the real user will also have the wrong answer, the conditional verification module 2 also contains the fault tolerance rate calculation unit, and considers the general input error slightly pure. The error rate is not too high. The user who answers the miscellaneous answers is illegally logged in, and the user will be unable to make a correct answer, resulting in a very high problem error rate, that is, the answer cannot be answered. . Therefore, the fault-tolerant Wei calculation unit % itself can define the error standard value 'age _ answer error rate over-the-counter riding value, the money allows the hunter to log in and block the secret number, while the rest of the password, through the pre-language communication method' For example, the mail city, the telephone _, the secret light department to the user, and the user is required to re-submit the account of the ship's passenger password and then the answer corresponding to the password.网路 Internet login security device 1 exposes the custom conditions to extract the security mechanism, including an implementation feature 'that is, when the user • corresponds to the customized solution, # input error, (4) interface 21 will not The butterfly is the wrong answer, but waits until the user answers all the custom questions and then interprets it. If it is higher than the above-mentioned wrong standard value, the system is informed by the ugly age of security fault tolerance. The advantage of people and _ practitioners is that the answer to the class of riding mosquitoes to board people, but also when the New Zealand bribes are wrong, or use violence to attack the county to break the answer. The method of obtaining the Frenchman's boots is not the same as that of the user's account. The question is that the answer will be answered, so the error rate is large, so there is no secret person; After you try to log in, you can re-do it, answer it, and change it to your account. This will protect the security of your account. The creation of Peng.&People's Safety 2 is a safety mechanism that exposes the conditional conditions. The security level depends on the user-defined conditional style. The correlation between the transitions is low, and the more difficult it is to be cracked. Second, the more user-defined conditional styles, the higher the security. The inconvenience of the user is limited, but how to decide depends on the use. The user's own user can change the level of security at any time by losing money from the domain-based financial system. The platform provider can decide whether the order of occurrence of the custom conditional conditions is fixed, and adjust for different needs and security conditions; in addition, the verification method of questions and answers can also be seen as if; brothers < 6 daring 'For example, for text or number (4) comparison; or for the early signing of the digital signature, the verification signature is entered; the encryption and decryption technology can also be used to verify the solution provided by the user. It can be _ times, or it can be multiple, if the fusion plus unlocking technology * 'user-side solution can also be given this kind of question and answer (10) Subtracting 'the calculation by the back-end program is a viable application. ",, the technical content of this creation has been exposed as above in the preferred embodiment, but it is not intended to limit the creation of this, any one who touches the fllb artist, Lin made a little change from the spirit of the creation and decorated the heart. The scope of protection of this creation is subject to the scope defined in the attached patent application. M422717 [Simple description of the diagram] Figure 1 is a schematic diagram of the architecture of the creation. The block diagram of this creation. The third figure is the schematic diagram of the operation interface of the creation (1). The fourth figure is the schematic diagram of the operation interface of the creation (2). The fifth diagram is the schematic diagram of the step of the creation. Description] 1...................Network login security device 10.............Server 101.......... ...Safety Verification Module 20 ..............Conditional Verification Module 21 ..............Operation Interface 22 ..... .........Account input unit 23 ..............Password input unit 24 ..............Custom question answering unit 241 .............Advanced setting unit 25 .............. Login condition unit 26 .............. Fault tolerance calculation Yuan 30..............Database 80..............Manager Terminal Equipment 90............ ..user terminal equipment

Claims (1)

M4ZZ/17 :、申請專利範圍: k 一種網路登入安全設備,包含: 一伺服器,藉由網際網路連接一使用者终端設備; 一條件式驗證模组’連接該舰器,該條件式驗證模组包含: 一帳號輪入單元,輸入使用者帳號; 一岔碼輸入單元,輸入使用者密碼;及 ]。單元’要求使用者自訂登人網站之—提問與一解 。错由謂合姆縣合該提問之該解㈣,得以驗證使用者並讓 使用者登入網站操作;及 2 一資料庫’係連接於該伺服器並健存該條件式驗證模組之資料。 ,求項,述之網路登人安綠備,針該條件式驗證馳更包含一 且入么卞件單元,提供使用者自訂登入條件。 3、如請求項1所述之網路登人安全設備, /、中4自5了問答單元之該提問與 忒解合係為一文予、一密碼、一圖檔、一 . 讀賴f 歧-金鑰。 如”月求項i所述之網路登入安全設備 P比一留- W目。丁問合早兀更包含一進 卜又疋早^ ’设定該些提問呈現於—操作介面。 5、 如請求項1崎之纟職7从^全賴 哭㈣狄 更包3 一音理者終端設備,連接 &quot;伺服益並對表使用者輪入 〗;早兀之該解答進 6、 如請求項丨輯之網路登人安全賴,料該值 模組加以驗證。 匕3女全驗證 其中該安全驗證模組係為一 7、 如請求項6所述之轉登人安全設備, 數位 憑證、-簽章或—金射式進行驗證 、如請求们所述之瓣私安全賴,射_件式驗賴組之該解答 以透過輸入或上傳方式傳至該伺服器。 如請求項1所述之網路登人安全設備,其·切條件式驗證模組更包含一 =率記算單元’當轉答之娜„於鱗,_鎖雜號並產生新 的登入密碼給使用者端。M4ZZ/17: Patent application scope: k A network login security device, comprising: a server for connecting a user terminal device through the Internet; a conditional verification module 'connecting the ship, the conditional expression The verification module includes: an account rotation unit, inputting a user account; a weight input unit, inputting a user password; and]. The unit 'requires the user to customize the boarding site's question-and-answer. The fault is that the Hem County has the solution to the question (4), and the user is authenticated and the user is logged into the website; and 2 a database is connected to the server and stores the information of the conditional verification module. , the item, the network is listed in the green, and the conditional verification machine includes a unit and a user-defined login condition. 3. If the network is connected to the security device as described in claim 1, the question and the solution of the question and the unit in the Q4 unit are a text, a password, a picture file, and a reading. - Key. For example, the network login security device P described in the monthly proposal i is more than one-W. The Ding Wenhe contains a new one and the early ones ^ 'Set these questions to be presented in the operation interface. Such as the request item 1 Kawasaki's dereliction of duty 7 from ^ Quan Lai cry (four) Di Gengbao 3 a sound operator terminal equipment, connection &quot; servo benefits and table user rounded; early 兀 the answer into 6, as requested The network access security of the item series is expected to be verified by the value module. 匕3 full verification of the security verification module is a 7, the transfer security device as described in claim 6, digital certificate , - signature or - ejaculation for verification, such as the private security of the request, the answer of the _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ The network access security device, the cut conditional verification module further includes a = rate calculation unit 'when the answer is </ s>, the _ lock number and a new login password is generated to the user.
TW100217449U 2011-09-16 2011-09-16 Network login security equipment TWM422717U (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW100217449U TWM422717U (en) 2011-09-16 2011-09-16 Network login security equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW100217449U TWM422717U (en) 2011-09-16 2011-09-16 Network login security equipment

Publications (1)

Publication Number Publication Date
TWM422717U true TWM422717U (en) 2012-02-11

Family

ID=46459982

Family Applications (1)

Application Number Title Priority Date Filing Date
TW100217449U TWM422717U (en) 2011-09-16 2011-09-16 Network login security equipment

Country Status (1)

Country Link
TW (1) TWM422717U (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI499933B (en) * 2013-11-21 2015-09-11 Qnap Systems Inc Electronic device and login method therefore

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI499933B (en) * 2013-11-21 2015-09-11 Qnap Systems Inc Electronic device and login method therefore

Similar Documents

Publication Publication Date Title
US20230239289A1 (en) Token based one-time password security
O'Hara et al. The spy in the coffee machine: the end of privacy as we know it
TWI571765B (en) A system and method to protect user privacy in multimedia uploaded to internet sites
US8555079B2 (en) Token management
US8972719B2 (en) Passcode restoration
JP2022070968A (en) Distributed, decentralized data aggregation
CN103714274B (en) System and method for enhancing Self-Service security application
US8656180B2 (en) Token activation
CN102281286B (en) Flexible end-point compliance and strong authentication method and system for distributed hybrid enterprises
Stock et al. Protecting users against XSS-based password manager abuse
EP1699205B1 (en) Method and system for safely disclosing identity over the Internet
Bertocci et al. Understanding windows cardspace: an introduction to the concepts and challenges of digital identities
WO2016202207A1 (en) Method and device for obtaining electronic document
US11250142B1 (en) System and method for protecting data in business transactions
CN109257333A (en) User authen method and equipment and security ststem
JP2010250811A (en) Bidirectional communication authentication system
EP3022867A1 (en) Strong authentication method
Szydlowski et al. Secure input for web applications
TWM422717U (en) Network login security equipment
JP2010257101A (en) User authentication system and method, scratch medium, and method for manufacturing the same
WO2018005893A1 (en) Client-side security key generation
JP6279348B2 (en) Web relay server device and web page browsing system
Plotkin Privacy, Security, and Cyberspace
Ozturk Privacy in emerging technologies
US20240012885A1 (en) Validation of a network operation related to use of a token via token-request-triggered storage of snapshot url data

Legal Events

Date Code Title Description
MM4K Annulment or lapse of a utility model due to non-payment of fees