WO2007087748A1 - A theft protection system for network account and a method thereof - Google Patents

A theft protection system for network account and a method thereof Download PDF

Info

Publication number
WO2007087748A1
WO2007087748A1 PCT/CN2007/000294 CN2007000294W WO2007087748A1 WO 2007087748 A1 WO2007087748 A1 WO 2007087748A1 CN 2007000294 W CN2007000294 W CN 2007000294W WO 2007087748 A1 WO2007087748 A1 WO 2007087748A1
Authority
WO
WIPO (PCT)
Prior art keywords
network account
account
client
theft device
external network
Prior art date
Application number
PCT/CN2007/000294
Other languages
French (fr)
Chinese (zh)
Inventor
Tao Huang
Original Assignee
Tao Huang
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tao Huang filed Critical Tao Huang
Publication of WO2007087748A1 publication Critical patent/WO2007087748A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1466Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks

Definitions

  • the invention belongs to the field of computer and network information security, and relates to a network identity authentication system and a method thereof, and in particular to a network account anti-theft system and a method thereof. Background technique
  • USB Key USB Token
  • RSA SecurlD Authentication Token Smart Cards
  • USB Authenticators SafeNet's iKey System!
  • Smart Key Smart Key
  • Datakey Gemplus smart card
  • Epass authentication lock etc.
  • the most commonly used are the RSA SecurlD authentication token and SafeNet's iKey series.
  • the RSA SecurlD identity authentication token adopts a dynamic password system, which is composed of a password token of the client side and an authentication server of the application system end.
  • the authentication server is the core part of the entire system. It is connected to the application server through the LAN to authenticate all Internet users.
  • the authentication system When the user logs in to the application system, the authentication system generates a dynamic password on the dedicated chip of the password token and the authentication server according to the security algorithm. After comparison, if the two passwords are the same, the user is a legitimate user, otherwise it is an illegal user. Dynamic passwords change every minute. When the user logs in, he or she can log in according to the current dynamic password displayed on the token, plus a personal identification number.
  • the RSA SecurlD authentication token also has the following drawbacks:
  • the USB token represented by SafeNet's iKey series generally uses the following methods: 1. The server or client obtains a random number and sends it to the other party.
  • Encryption and decryption task calls, operations, intermediate result storage, result checking, ciphertext synthesis, or decomposition are not all done within the iKey, requiring client application software to participate.
  • the configuration of the iKey can be directly operated by the merchant's software on the client, and there are various dangers caused by hackers breaking the merchant software.
  • USB KEY technologies have implemented hash algorithms, public key algorithms, random number generation, and symmetric key algorithms in some or all of the devices.
  • the invocation of the encryption and decryption process, the decomposition of the plaintext and ciphertext, the result verification, the algorithm selection, and the parameter configuration all involve part or all of the client software participation.
  • the technical problem to be solved by the present invention is to provide a network account anti-theft system and a method thereof, which can effectively prevent a hacker from illegally entering a user account by bypassing the encryption authentication under the premise of being convenient to use.
  • the technical solution adopted by the present invention is to provide a network account anti-theft method, which includes the following steps: a, connecting an external network account anti-theft device having a unique serial number to the client;
  • the external network account anti-theft device encrypts the account verification information (such as the account user password, the serial number of the network account anti-theft device, etc., and the account user password is generally the account user's ⁇ intensity password or the second-level password). Requesting the account verification information ciphertext of the login to the server;
  • the network account anti-theft device uploads the information such as the account verification information ciphertext and the account number of the account to be uploaded to the application server through the client;
  • the application server decrypts the account verification information cipher from the external network account anti-theft device, and checks the account verification information (the account user password, the serial number, etc., the account user password is generally an account number).
  • the application server checks whether all the information is correct. If it is correct, the access is allowed. If there is an error, the access is stopped.
  • the task call, operation, storage of intermediate results, result check, synthesis or decomposition of plaintext and ciphertext of the encryption and decryption itself are completely carried out inside the user's external network account anti-theft device.
  • the present invention further includes the following method for periodically confirming valid online, comprising the following steps: the application server periodically sends a verification handshake signal encrypted by a dynamic encryption and a public key algorithm; and the external network account anti-theft device decrypts the verification handshake signal. ;
  • the network account anti-theft device generates an encrypted response handshake response ciphertext
  • the external network account anti-theft device uploads the handshake response ciphertext and the account number to the application server through the client through the network;
  • the application server decrypts the handshake response ciphertext
  • the application server checks whether all the information is correct, and continues to service if there is no error. If it is wrong, the connected application service is stopped.
  • the network account anti-theft method of the present invention further includes a method for exiting the service, including the following steps: when the client application login needs to be logged out, the client sends an exit service request to the application server, and the application server stops the accessed service;
  • the client prompts the user to remove the external network account anti-theft device.
  • the network account anti-theft method of the present invention further includes a method for synchronously adjusting the dynamic encryption/decryption circuit, which is specifically:
  • the network authentication server or the application server sends a synchronization adjustment signal to the external network account anti-theft device, thereby triggering the external network account anti-theft device to perform synchronization adjustment to maintain synchronization with the network authentication management server or the application server.
  • the network account anti-theft method of the present invention further includes a multi-application, multi-account simple login method, including the following steps: calling a client application login program;
  • the client login program sends an application service code or feature word corresponding to the currently logged-in application to the external network account anti-theft device;
  • the external network account anti-theft device sends all the accounts under the application service code or feature word stored in the internal to the client;
  • the client login program displays all accounts received from the external network account anti-theft device for the user to select;
  • the user selects the login account on the client and enters the login password.
  • the client login program sends the selected account information and login password to the external network account anti-theft device; the external network account anti-theft device checks whether the account information and the login password sent by the client are correct, and if there is an error, the login is stopped, if not, then Continue with step b.
  • the login password may be the owner password of the external network account anti-theft device or the primary password that the user can easily remember.
  • the external network account anti-theft device storing, in the external network account anti-theft device, a plurality of application service codes or feature words, and allowing some or all of the application service codes or feature words to be sold or issued to the network account in the external network account anti-theft device.
  • the application service is not bound. After the external network account anti-theft device is sold or issued to each user of the network account, the application service is additionally bound without changing the core confidential data area.
  • the network authentication server or the application server sends the encrypted synchronization adjustment signal to the external network account anti-theft device, and the external network account anti-theft device receives the synchronization adjustment.
  • the present invention also provides a network account anti-theft system, including: a client; and:
  • the external network account anti-theft device is connected to the client, and is used for encrypting the account verification information and the like by the dynamic encryption and the public key algorithm to generate an account verification information ciphertext for requesting login to the server;
  • the information ciphertext and the account number are uploaded to the application server on the network through the client; each of the external network account anti-theft devices has a unique serial number, and the core confidential data area that the client cannot access in any mode is internally provided.
  • 'Application server which decrypts and dynamically decrypts the account verification information ciphertext requested by the external network account anti-theft device through the public key algorithm, checks the account verification information, checks whether all the information is correct, and allows access without error. If there is an error, stop accessing;
  • the special programming device is configured to program the core confidential data area and other areas in the non-volatile memory in the external network account anti-theft device after being checked by the secure handshake communication protocol.
  • the network authentication server can be used to provide synchronization adjustment and other account anti-theft system management services.
  • the external network account anti-theft device includes:
  • a first random sequence generator for generating a configurable random sequence
  • non-volatile memory for storing serial number, account information, user password of an account (generally an account user's strength password or secondary password), a local public key, a private key, a coefficient factor of a random sequence, and the like;
  • Public key algorithm encryption circuit performing public key algorithm encryption
  • the control unit is mainly used to call the related information to synthesize the account verification information, the encryption operation call, and configure the first
  • the machine sequence generator performs synchronous adjustment according to the decrypted synchronization signal, and communicates with the client through the peripheral interface.
  • a second random sequence generator for generating a configurable random sequence
  • the public key algorithm decryption circuit decrypts the information by using a private key stored in the non-volatile memory
  • the control unit is mainly used for decrypting the operation call, configuring the second random sequence generator, etc., and verifying whether the serial number included in the signal sent by the application server after decryption is consistent with the serial number stored in the non-volatile memory. According to the decrypted synchronization signal, the synchronization is adjusted, and the client communicates through the peripheral interface.
  • the network account anti-theft device may also include a first random sequence generator for generating a configurable random sequence
  • non-volatile memory for storing serial number, account information, user password of an account (generally a high-strength password or a secondary password of an account user), a local public key, a private key, a coefficient factor of a random sequence, and the like;
  • the public key algorithm encryption circuit encrypts the account verification information and the account information stored in the non-volatile memory by a public key algorithm
  • the dynamic encryption circuit dynamically encrypts the encryption result of the public key algorithm by using a random sequence generated by the first random sequence generator
  • the control unit is mainly used for calling related information to synthesize account verification information, encrypting operation call, configuring the first random sequence generator, performing synchronous adjustment on the first random sequence generator according to the decrypted synchronization signal, and the client through the peripheral interface communication.
  • a second random sequence generator for generating a configurable random sequence
  • the dynamic decryption circuit dynamically decrypts the verification handshake signal encrypted by the dynamic encryption and public key algorithm periodically sent by the application server by using a random sequence generated by the second random sequence generator;
  • the public key algorithm decryption circuit decrypts the dynamically decrypted information by using a private key stored in the non-volatile memory
  • the control unit is mainly used for decrypting the operation call, configuring the second random sequence generator, etc., and verifying whether the serial number included in the signal sent by the application server after decryption is consistent with the serial number stored in the non-volatile memory. And synchronizing the second random sequence generator according to the decrypted synchronization signal from the application server, communicating with the client through the peripheral interface, and the like.
  • the external network account anti-theft device further includes:
  • a memory for storing intermediate data and working with the control unit
  • the network account anti-theft device may further comprise: a programming peripheral interface connected to the programming device, the interface needs to be activated by the communication protocol and the programming device verification handshake authentication;
  • the core confidential data area is disposed in a non-volatile memory, and is used for storing core confidential data such as a private key, a serial number, and the like that are not allowed to be accessed by an external device other than the programming device;
  • the control unit can be used to verify the handshake communication protocol between the programming peripheral interface and the programming device, and only allow the allowed specific module to access the core confidential data area in the non-volatile memory, and prohibit the interface that can be connected with the client.
  • the circuit accesses the core confidential data area and certain registers of each encryption and decryption circuit.
  • the invention combines the dynamic sequence agreed by the application server end and the external encryption anti-theft device for dynamic encryption and public key algorithm encryption, and the task call, the operation, the storage of the intermediate result, the result check, the plaintext and the encryption and decryption of the client itself.
  • the synthesis or decomposition of the ciphertext is completely carried out in the device (even in a single SOC chip in the device), regardless of the client software, and does not leave traces of data on the client hard disk, and there are any modes inside the chip.
  • the user has one device at hand, and can log in to multiple accounts on servers of different or the same service content on a client such as any PC or laptop connected to the network.
  • the network account anti-theft device can display on the client according to the specific application number corresponding to the currently logged-in client software and let the client select the account currently required to log in, and input a password for confirming the identity of the device owner, without inputting an account. , random numbers, etc., so login is easy to use.
  • FIG. 1 is a schematic structural diagram of a network account anti-theft system of the present invention.
  • FIG. 2 is a schematic structural diagram of an external network account anti-theft device of the present invention.
  • 3 is a flow chart of the network account anti-theft method of the present invention. detailed description
  • the network account anti-theft system of the present invention includes: an external network account anti-theft device 1, a client 2,
  • the application server 4, the network authentication management server 5, the programming device 6, the external network account anti-theft device and the client are connected through various communication interfaces such as USB, serial port, infrared, Bluetooth, etc., the client and the application server, and the network authentication management
  • the servers are connected via a network 3 (Internet, local area network, wireless network, etc.).
  • the external network account anti-theft device is connected to the client, and is used for verifying account information (such as an internally stored account user password (generally an account user's high-intensity password or a second-level password), a serial number, and an account information.
  • account information such as an internally stored account user password (generally an account user's high-intensity password or a second-level password), a serial number, and an account information.
  • the application server which requests the login account verification information ciphertext from the server to be decrypted and dynamically decrypted by the public key algorithm, and checks the user password of the account (generally the high-strength password or the secondary password of the account user) and the sequence. No information, etc., to check whether all information is correct, if it is correct, access is allowed, and if there is an error, access is stopped.
  • the programming device is configured to program the core confidential data area and other areas in the non-volatile memory in the external network account anti-theft device after being checked by the secure handshake communication protocol.
  • the external network account anti-theft device includes:
  • the non-volatile memory 11 is configured to store a coefficient component of the random sequence, a serial number, account information, a user password of the account (generally an account strength password or a secondary password of the account user), a local public key, a private key, and the like;
  • the first random sequence generator 7 is configured to generate a configurable random sequence according to a coefficient factor stored in the nonvolatile memory 11;
  • the dynamic encryption circuit 8 dynamically encrypts the serial number, account information, and the like stored in the nonvolatile memory 11 by using a random sequence generated by the first random sequence generator 7.
  • the public key encryption circuit 9 performs the public key encryption on the dynamically encrypted information
  • a second random sequence generator 19 configured to generate a configurable random sequence according to a coefficient factor stored in the nonvolatile memory 11;
  • the public key decryption circuit 16 performs a public key algorithm decryption on the verification handshake signal encrypted by the dynamic encryption and public key algorithm periodically sent by the application server by using the private key stored in the nonvolatile memory 11;
  • the dynamic decryption circuit 17 the information decrypted by the public key is dynamically decrypted by the random sequence generated by the second random sequence generator 19;
  • the control circuit 10 is configured to be used for calling the related information to synthesize the account verification information, and the encryption and decryption operation is called to configure the first random sequence generator to verify the serial number and the nonvolatile state of the signal sent by the application server after being decrypted. Whether the serial numbers stored in the sexual memory 11 are identical. Configuring a first random sequence generator ⁇ and a second random sequence The generator 19 and other modules trigger the first random sequence generator 7 and the second random sequence generator 19 to perform synchronization adjustment according to the synchronization adjustment signal, and the control interface circuit completes the communication protocol with the client.
  • the memory 18 is configured to store intermediate data and cooperate with the control unit 10.
  • the path selector 12 is configured to select a different interface control circuit 13, 14 to communicate with the client 2, and a programming peripheral interface 15 connected to the programming device, the interface needs to be authenticated by the communication handshake protocol and the programming device to be activated,
  • the core data area 20 and other data areas in the nonvolatile memory 11 are accessed and burned using the account security system dedicated programming device 6 in the secure mode.
  • the core confidential data area 20 is disposed in the non-volatile memory 11 for storing core secret data such as a private key, a serial number, and the like that are not allowed to be accessed by an external device other than the dedicated programming device;
  • the control unit 10 can also be used to verify the communication handshake protocol of the programming peripheral interface 15 and the dedicated programming device, and only allow the specific module to be allowed (such as the activated programming peripheral interface 15, the random sequence generator, the public key).
  • the encryption and decryption circuit, the dynamic encryption/decryption circuit, etc. can access the core confidential data area 20 in the non-volatile memory 11, and prohibit the interface circuit that can be connected to the client from accessing the core confidential data area 20 and some registers of the encryption and decryption circuits. .
  • the core secret data area in the non-volatile memory cannot be accessed through the client interface 13 or 14 in any mode. Therefore, hackers cannot access, steal, or tamper with data in core secret areas through the network and clients.
  • the network authentication server or the application server is configured to send a synchronization adjustment signal (transmitted by the public key algorithm to encrypt the ciphertext mode) to the external network account anti-theft device, thereby triggering the first random sequence generator 7 Synchronizing with the second random sequence generator 19 (e.g., resetting at the synchronization point state) to maintain synchronization with the random sequence of the network authentication management server 5 or the application server 4 (i.e., causing the random sequencer to be in a consistent state, such as Both are reset to their initial state).
  • a synchronization adjustment signal transmitted by the public key algorithm to encrypt the ciphertext mode
  • the order of the dynamic encryption circuit 8 and the public key encryption circuit 9 in the data path may be interchanged, and the order of the public key decryption circuit 16 and the dynamic decryption circuit 17 in the data path may also be interchanged, but The encryption and decryption order of the server corresponds.
  • the main process of the network account anti-theft method of the present invention is as follows:
  • Each external network anti-theft device 1 has a unique serial number burned in the internal non-volatile memory 11. The serial number between any two external network anti-theft devices 1 is different.
  • the non-volatile memory 11 in the external network account anti-theft device also stores an application number, a key, a random sequence generator factor, and the like, and a plurality of network accounts of the user,
  • Step 1 The user connects the external network account anti-theft device 1 to the client 2,
  • Step 2 The control unit 10 configures other modules in the external network account anti-theft device 1
  • Step 3 User client 2 Open the client application login interface.
  • Step 4 The client login program sends the application service code or feature word to the external network account anti-theft device, and informs the external network account anti-theft device 1 which application is currently logged in (such as the service platform B provided by the operator A), step 5, the external network
  • the account anti-theft device sends all the accounts under the application service code or feature word stored internally to the client:
  • the external network account anti-theft device 1 sends all the network accounts under the non-volatile storage port 11 (such as the service platform B provided by the operator A) to the client 2;
  • Step 6 The client login program displays the network account anti-theft device 1 for all accounts under the application, and the user selects the account to be logged in. (If there is only one, it can be automatically selected):
  • Step 7 The user fills in the login password (multiple accounts can use the same password, or different passwords, which can also be the owner password of the external network account anti-theft device or the primary password that the user can easily remember);
  • Step 8 The client login program of the client 2 transmits the password of the account selected by the user to the external network account anti-theft device through the interface.
  • Step 9 external network account anti-theft device 1 check to confirm whether the account password is correct; if there is a mistake, stop logging in, if the password is correct, continue to step 10;
  • Step 10 the control unit 10, the serial number stored in the non-volatile memory 11, the user password corresponding to the selected account (generally the high-intensity password or the second-level password of the account user, not the owner password of the device), and the account
  • the necessary information, the check sequence, and the like constitute account verification information, and together with the random sequence generated by the first random sequence generator 7, are dynamically encrypted by the dynamic encryption circuit 8, and the encrypted result is further subjected to the public key algorithm encryption circuit 9.
  • the login request ciphertext is generated; (the dynamic encryption algorithm and the public key encryption algorithm are both prior art and can be implemented in various manners.
  • the dynamic encryption method is specifically The configurable random series generated by the first random sequence generator 7 is subjected to a bitwise exclusive OR operation with data such as a serial number stored in the nonvolatile memory port, necessary information in the corresponding account, and the like. (The order of the public key algorithm and the dynamic encryption algorithm can be exchanged, but it needs to correspond to the application server decryption operation order)
  • Step 11 the external network account anti-theft device will request the login account verification information ciphertext and account number to the server 2 to the client 2;
  • Step 12 The application login program of the client 2 passes the network 3 to check the account verification information ciphertext and account of the login.
  • Step 13 The application server 4 passes the public key algorithm and dynamic decryption of the account verification information cipher requesting to log in, and checks the user password of the account (generally the high-strength password or the secondary password of the account user), the serial number, and the like. Step 14. The application server 4 checks whether all the information is correct. If there is an error, stop logging in, if it is correct, continue with step 15;
  • Step 15 The application server notifies the client, and the client software of the client 2 and the server software of the application server 4 normally serve the user.
  • the present invention may further include: the application server 4 may select whether to time and the external network account anti-theft device connected to the client 2 according to the needs of the operator. 1 The handshake is confirmed by an encrypted method to confirm that the login is always valid.
  • Step 16 The application server 4 periodically sends the verification handshake signal encrypted by the dynamic encryption and the public key algorithm to the external network account anti-theft device through the client 2;
  • Step 17 The external network account anti-theft device decrypts and verifies the verification handshake signal: first, the public key decryption circuit 16 decrypts the private key in the non-volatile memory 11 with a public key algorithm, and then uses the dynamic decryption circuit 17 The sequence generated by the second random sequencer generator 19 is dynamically decrypted.
  • the control unit 10 confirms that the serial number contained in the data sent by the application server 4 is confirmed in comparison with the serial number of the current local external network account anti-theft device 1 used by the user; (the order of the public key algorithm and the dynamic decryption algorithm can be exchanged, But it needs to correspond to the application server encryption operation order)
  • Step 18 The external network account anti-theft device 1 dynamically encrypts the random sequence generated by the first random sequence generator 7, the serial number stored in the non-volatile memory 11, and the necessary information in the corresponding account through the dynamic encryption circuit 8.
  • the public key encryption circuit 9 generates a handshake response message after public key encryption; (the order of the public key algorithm and the dynamic encryption algorithm can be exchanged, but needs to correspond to the application server decryption operation order)
  • Step 19 The external network account anti-theft device uploads the generated handshake response ciphertext and account number from the network 3 to the application server 4 through the client 2;
  • Step 20 The application server 4 decrypts the handshake response ciphertext through the public key algorithm and the dynamic decryption step 21, and the application server 4 checks whether all the information is correct. If the error is correct, the normal login is maintained; otherwise, the login is stopped, and the client is stopped. Software for user service.
  • the server can select whether to synchronize with the external network account of the user terminal according to the needs of the network application.
  • the anti-theft device uses an encrypted method to confirm that the login is always valid. The handshake should be automatically performed. In the case that the external network account anti-theft device is normal and effective, it is not required. The user manually intervenes and does not interfere with the application running.
  • the external encryption anti-theft device reserves and provides a plurality of application service codes or feature words in the non-volatile memory 11, wherein some or all of the application service codes or feature words are sold or issued to the network account anti-theft device for each user's fashion. No application services are bound. After the network account anti-theft device is sold or issued to each user of the network account, the application service may be additionally bound and the account information related to the application service may be saved without changing the core confidential data area.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

A theft protection system for network account and a method thereof are provided, the technical method mainly includes: a. An external theft protection apparatus with a unique sequence number is connected to the client; b. The external theft protection apparatus generates the account verification information cryptograph for requesting logon to the server after the encryption of the account verification information; c. The external theft protection apparatus transmits the verification information cryptograph and the account to the application server over the network through the client; d. The application server decrypts the verification information cryptograph, and verifies the account verification information; e. The application server checks all of the information to determine whether there is any error. In the above, the task schedule of the encryption and decryption, the calculation, the storing of the intermediate result, the result verification, and the combination and separation of the text and cryptograph are all processed within the apparatus.

Description

一种网络帐号防盗系统及其方法 技术领域  Network account anti-theft system and method thereof
本发明属于计算机与网络信息安全领域, 涉及一种网络身份认证系统及其方法, 具 体地说, 涉及一种网络帐号防盗系统及其方法。 背景技术  The invention belongs to the field of computer and network information security, and relates to a network identity authentication system and a method thereof, and in particular to a network account anti-theft system and a method thereof. Background technique
目前现有的身份认证产品有: USB Key, USB令牌、 RSA SecurlD身份认证令牌和 Smart Cards and USB Authenticators, SafeNet的 iKey系歹!], Smart Key, Datakey, Gemplus 智能卡, 飞天诚信的 Epass身份认证锁等。 其中最常用的是 RSA SecurlD身份认证令牌 及 SafeNet的 iKey系列。  Currently available identity products are: USB Key, USB Token, RSA SecurlD Authentication Token and Smart Cards and USB Authenticators, SafeNet's iKey System! ], Smart Key, Datakey, Gemplus smart card, Epass authentication lock, etc. The most commonly used are the RSA SecurlD authentication token and SafeNet's iKey series.
其中, RSA SecurlD身份认证令牌采用动态密码系统, 其由用户端的密码令牌和应 用系统端的认证服务器组成。 认证服务器是整个系统的核心部分, 与应用系统服务器通 过局域网相连, 对所有上网用户进行身份认证。 用户登录应用系统时, 依据安全算法, 认证系统会在密码令牌的专用芯片和认证服务器上同时生成动态密码, 经过比较, 若双 方密码相同, 则为合法用户, 否则为非法用户。动态密码每分钟变化一次。用户登录时, 只要根据令牌上显示的当前动态密码,再加上一个个人识别码登录即可。但 RSA SecurlD 身份认证令牌也存在如下的缺陷:  The RSA SecurlD identity authentication token adopts a dynamic password system, which is composed of a password token of the client side and an authentication server of the application system end. The authentication server is the core part of the entire system. It is connected to the application server through the LAN to authenticate all Internet users. When the user logs in to the application system, the authentication system generates a dynamic password on the dedicated chip of the password token and the authentication server according to the security algorithm. After comparison, if the two passwords are the same, the user is a legitimate user, otherwise it is an illegal user. Dynamic passwords change every minute. When the user logs in, he or she can log in according to the current dynamic password displayed on the token, plus a personal identification number. However, the RSA SecurlD authentication token also has the following drawbacks:
1、需要保持令牌与服务器端的时钟同步。如果令牌与服务器端的时钟源稍有偏差而 不能保持良好的同步, 当累计偏差大到预设值(典型为 60秒)就会发生合法用户无法登 录的问题。 由于令牌和服务器间没有通信渠道, 无法定期自动同步, 需要在服务端登录 人工校正。 而通常消费级别的时钟与标准时钟的偏差每个月达到几秒到十几秒是非常普 遍的允许误差分布。  1. It is necessary to keep the token synchronized with the clock on the server side. If the token is slightly deviated from the server's clock source and cannot maintain good synchronization, the problem of legitimate users being unable to log in occurs when the accumulated deviation is as large as the preset value (typically 60 seconds). Since there is no communication channel between the token and the server, it is not possible to synchronize automatically on a regular basis, and it is necessary to log in manually on the server. The deviation of the usual consumption level clock from the standard clock from a few seconds to a dozen seconds per month is a very general allowable error distribution.
2、并且用户每次登录时需要通过键盘输入一长串无规律的随机数字,一旦输错就要 重新操作。 而且在临近动态密码变化的时间点操作时特别容易因时钟没对齐或网络延迟 而被拒绝登录, 使用起来非常不方便。  2. Each time the user logs in, he or she needs to input a long series of random random numbers through the keyboard. Once the error is entered, it is necessary to re-operate. Moreover, it is particularly easy to log in due to clock misalignment or network delay when operating near the time when the dynamic password changes, which is very inconvenient to use.
3、由于在用户登录后一定的时间窗口内密码继续有效,所以就有黑客利用木马软件 等手段跟踪记录并在该时间窗口内用该密码登录的危险。该危险已被国外专家明确指出。  3. Since the password continues to be valid within a certain time window after the user logs in, there is a danger that the hacker uses the Trojan software to track the record and log in with the password in the time window. This danger has been clearly pointed out by foreign experts.
以 SafeNet的 iKey系列为代表的 USB令牌, 所采用的身份认证方法一般为: 1、 服务器或客户端取得随机数, 并将之发给对方。  The USB token represented by SafeNet's iKey series generally uses the following methods: 1. The server or client obtains a random number and sends it to the other party.
6 2、 取出各自存储的算法因子。 6 2. Take out the algorithm factors stored separately.
3、 对这两个数进行运算。  3. Perform operations on these two numbers.
4、看运算结果是否一致。 如果一致,说明两端的算法因子是一致的(因为随机数是 共用的, 影响结果的只能是算法因子)。 进而推出客户端的算法因子是约定的数-- -客户 是合法的用户。 ■  4. See if the results of the operation are consistent. If they are consistent, the algorithm factors at both ends are consistent (because random numbers are shared, only the algorithm factors are affected). In turn, the algorithmic factor of the client is the agreed number -- the client is a legitimate user. ■
但上述认证方法存在如下缺陷:  However, the above authentication method has the following drawbacks:
♦ 加密解密本身的任务调用、 运算、 中间结果的存放、 结果检验、 密文合成或 分解并不是都在 iKey内完成, 需要客户端应用软件参与。  ♦ Encryption and decryption task calls, operations, intermediate result storage, result checking, ciphertext synthesis, or decomposition are not all done within the iKey, requiring client application software to participate.
♦ iKey的配置等可以在客户端上用商家的软件直接操作,存在黑客攻破商家软 件而引起的种种危险。  ♦ The configuration of the iKey can be directly operated by the merchant's software on the client, and there are various dangers caused by hackers breaking the merchant software.
♦ 对于 iKey中只做了一层哈虚算法加密, 没有采用动态加密。 假设黑客多次 用客户端上的木马软件跟踪服务器发的随机数和 iKey回发的结果 (即明文 和密文), 比较容易破解算法因子等而获得非法接入的手段。  ♦ Only one layer of hash algorithm encryption is used in the iKey, and no dynamic encryption is used. It is assumed that the hacker repeatedly uses the Trojan software on the client to track the random number sent by the server and the result of the iKey postback (ie, plaintext and ciphertext), which is easier to crack the algorithm factors and obtain the means of illegal access.
其他 USB KEY技术, 大多已经在装置中部分或全部实施散列算法、 公开密钥算法、 随机 数生成、 对称密钥算法。 但加解密过程的调用、 明文、 密文的分解合成、 结果校验、 算法选择 和参数配置等都会部分或全部涉及客户端软件参与。  Most other USB KEY technologies have implemented hash algorithms, public key algorithms, random number generation, and symmetric key algorithms in some or all of the devices. However, the invocation of the encryption and decryption process, the decomposition of the plaintext and ciphertext, the result verification, the algorithm selection, and the parameter configuration all involve part or all of the client software participation.
发明内容 Summary of the invention
本发明所要解决的技术问题是提供一种网络帐号防盗系统及其方法, 其在使用便捷 的前提下能有效防止黑客绕过加密认证而非法进入用户帐号。  The technical problem to be solved by the present invention is to provide a network account anti-theft system and a method thereof, which can effectively prevent a hacker from illegally entering a user account by bypassing the encryption authentication under the premise of being convenient to use.
为了解决上述技术问题, 本发明所采用的技术方案是- 首先提供一种网络帐号防盗方法, 包括如下步骤- a、 在客户端连接拥有唯一序列号的外接网络账号防盗装置;  In order to solve the above technical problem, the technical solution adopted by the present invention is to provide a network account anti-theft method, which includes the following steps: a, connecting an external network account anti-theft device having a unique serial number to the client;
b、 外接网络账号防盗装置, 将账号校验信息 (如账号用户密码、 网络账号防盗装 置的序列号等, 所述的帐号用户密码一般为账号用户的髙强度密码或二级密码)加密后 生成向服务器请求登录的账号校验信息密文;  b. The external network account anti-theft device encrypts the account verification information (such as the account user password, the serial number of the network account anti-theft device, etc., and the account user password is generally the account user's 髙 intensity password or the second-level password). Requesting the account verification information ciphertext of the login to the server;
c、 网络账号防盜装置将请求登录的账号校验信息密文与帐号等信息通过客户端在 网络上传给应用服务器;  c. The network account anti-theft device uploads the information such as the account verification information ciphertext and the account number of the account to be uploaded to the application server through the client;
d、 应用服务器将来自外接网络账号防盗装置的请求登录的账号校验信息密文经过 解密, 核查账号校验信息 (账号用户密码、 序列号等, 所述的帐号用户密码一般为账号  d. The application server decrypts the account verification information cipher from the external network account anti-theft device, and checks the account verification information (the account user password, the serial number, etc., the account user password is generally an account number).
7 07 000294 用户的髙强度密码或二级密码); ' 7 07 000294 User's strength code or secondary password); '
e、 应用服务器查验所有信息是否无误, 无误则允许接入, 有误则停止接入。  e. The application server checks whether all the information is correct. If it is correct, the access is allowed. If there is an error, the access is stopped.
加密解密本身的任务调用、 运算、 中间结果的存放、 结果检验、 明文和密文的合成 或分解, 完全在用户的外接网络账号防盗装置内部进行。  The task call, operation, storage of intermediate results, result check, synthesis or decomposition of plaintext and ciphertext of the encryption and decryption itself are completely carried out inside the user's external network account anti-theft device.
进一步地, 本发明还包括如下定时确认有效在线的方法, 包括如下步骤- 应用服务器定时发送经过动态加密和公开密钥算法加密的校验握手信号; 外接网络账号防盗装置将校验握手信号解密核实;  Further, the present invention further includes the following method for periodically confirming valid online, comprising the following steps: the application server periodically sends a verification handshake signal encrypted by a dynamic encryption and a public key algorithm; and the external network account anti-theft device decrypts the verification handshake signal. ;
网络账号防盗装置生成经过加密生成握手应答密文;  The network account anti-theft device generates an encrypted response handshake response ciphertext;
外接网络账号防盗装置将握手应答密文和账号等通过客户端在网络上传给应用服 务器;  The external network account anti-theft device uploads the handshake response ciphertext and the account number to the application server through the client through the network;
应用服务器将握手应答密文经过解密;  The application server decrypts the handshake response ciphertext;
应用服务器查验所有信息是否无误, 无误则继续服务, 有误则停止已接入的应用服 务。  The application server checks whether all the information is correct, and continues to service if there is no error. If it is wrong, the connected application service is stopped.
进一步地, 本发明的网络帐号防盗方法还包括服务退出的方法, 包括如下步骤: 当需要退出客户端应用登录时, 客户端发出退出服务请求给应用服务器, 应用服务 器停止所接入的服务;  Further, the network account anti-theft method of the present invention further includes a method for exiting the service, including the following steps: when the client application login needs to be logged out, the client sends an exit service request to the application server, and the application server stops the accessed service;
客户端提示用户取走外接网络账号防盗装置。  The client prompts the user to remove the external network account anti-theft device.
进一步地, 本发明的网络帐号防盗方法还包括动态加解密电路同步调整的方法, 具 体为:  Further, the network account anti-theft method of the present invention further includes a method for synchronously adjusting the dynamic encryption/decryption circuit, which is specifically:
网络认证服务器或应用服务器, 发送同步调整信号给外接网络账号防盗装置, 从而 触发外接网络账号防盗装置作同步调整, 以保持与网络认证管理服务器或应用服务器 同步。  The network authentication server or the application server sends a synchronization adjustment signal to the external network account anti-theft device, thereby triggering the external network account anti-theft device to perform synchronization adjustment to maintain synchronization with the network authentication management server or the application server.
进一步地, 本发明的网络帐号防盗方法还包括多应用、 多账号简便登录的方法, 包 括如下步骤- 调用客户端应用登录程序;  Further, the network account anti-theft method of the present invention further includes a multi-application, multi-account simple login method, including the following steps: calling a client application login program;
客户端登录程序发送对应当前登录应用的应用服务代码或特征字到外接网络帐号 防盗装置; '  The client login program sends an application service code or feature word corresponding to the currently logged-in application to the external network account anti-theft device;
外接网络帐号防盗装置将内部存储的该应用服务代码或特征字下的所有帐号发送 给客户端;  The external network account anti-theft device sends all the accounts under the application service code or feature word stored in the internal to the client;
客户端登录程序显示从外接网络帐号防盗装置接收的所有帐号供用户选择;  The client login program displays all accounts received from the external network account anti-theft device for the user to select;
8 用户在客户端选择登录账号, 输入登录密码; 8 The user selects the login account on the client and enters the login password.
客户端登录程序将所选账号信息、 登录密码发送到外接网络帐号防盗装置; 外接网络帐号防盗装置检查客户端发来的账号信息和登录密码是否无误,如果有误 则停止登陆, 如果无误, 则继续步骤 b。  The client login program sends the selected account information and login password to the external network account anti-theft device; the external network account anti-theft device checks whether the account information and the login password sent by the client are correct, and if there is an error, the login is stopped, if not, then Continue with step b.
所述的登陆密码可以是外接网络帐号防盗装置的主人密码或用户较易记忆的初级 密码。  The login password may be the owner password of the external network account anti-theft device or the primary password that the user can easily remember.
进一步地, 在所述外接网络帐号防盗装置中存储多个应用服务代码或特征字, 并允 许其中部分或全部应用服务代码或特征字在该外接网络帐号防盗装置出售或颁发给网络 账号各用户时尚未绑定任何应用服务, 在该外接网络账号防盗装置出售或颁发给网络账 号各用户后, 在不需更改核心机密数据区的情况下, 追加绑定应用服务。  Further, storing, in the external network account anti-theft device, a plurality of application service codes or feature words, and allowing some or all of the application service codes or feature words to be sold or issued to the network account in the external network account anti-theft device. The application service is not bound. After the external network account anti-theft device is sold or issued to each user of the network account, the application service is additionally bound without changing the core confidential data area.
所述网络认证服务器或应用服务器发送经过加密的同步调整信号给外接网络帐号防 盗装置, 外接网络帐号防盗装置收到后, 作同步调整。  The network authentication server or the application server sends the encrypted synchronization adjustment signal to the external network account anti-theft device, and the external network account anti-theft device receives the synchronization adjustment.
同时, 本发明还提供一种网络帐号防盗系统, 包括: 客户端; 及:  Meanwhile, the present invention also provides a network account anti-theft system, including: a client; and:
外接网络帐号防盗装置, 与客户端相连接, 用于将账号校验信息等经过动态加密和 公开密钥算法加密后生成向服务器请求登录的账号校验信息密文; 将请求登录的账号校 验信息密文和帐号等通过客户端在网络上传给应用服务器; 所述每个外接网络帐号防盗 装置均拥有唯一的序列号,且内部设有任何模式下客户端都无法访问的核心机密数据区。 ' 应用服务器,其将外接网络帐号防盗装置请求登录的账号校验信息密文经过公开密 钥算法解密和动态解密,核査账号校验信息, 査验所有信息是否无误,无误则允许接入, 有误则停止接入;  The external network account anti-theft device is connected to the client, and is used for encrypting the account verification information and the like by the dynamic encryption and the public key algorithm to generate an account verification information ciphertext for requesting login to the server; The information ciphertext and the account number are uploaded to the application server on the network through the client; each of the external network account anti-theft devices has a unique serial number, and the core confidential data area that the client cannot access in any mode is internally provided. 'Application server, which decrypts and dynamically decrypts the account verification information ciphertext requested by the external network account anti-theft device through the public key algorithm, checks the account verification information, checks whether all the information is correct, and allows access without error. If there is an error, stop accessing;
专用编程设备, 用于在通过安全握手通讯协议检査后, 对外接网络账号防盗装置内 的非易失性存储器中的核心机密数据区及其他区域进行编程。  The special programming device is configured to program the core confidential data area and other areas in the non-volatile memory in the external network account anti-theft device after being checked by the secure handshake communication protocol.
网络认证服务器, 可以用于提供同步调整和其他账号防盗系统管理服务。  The network authentication server can be used to provide synchronization adjustment and other account anti-theft system management services.
进一步地, 所述的外接网络帐号防盗装置包括:  Further, the external network account anti-theft device includes:
第一随机序列发生器, 用于产生可配置的随机序列;  a first random sequence generator for generating a configurable random sequence;
非易失性存储器, 用于存储序列号、 帐号信息、 账号的用户密码(一般为账号用户 的髙强度密码或二级密码)、 本地公钥、 私钥、 随机序列的系数因子等信息;  a non-volatile memory for storing serial number, account information, user password of an account (generally an account user's strength password or secondary password), a local public key, a private key, a coefficient factor of a random sequence, and the like;
动态加密电路, 进行动态加密;  Dynamic encryption circuit for dynamic encryption;
公开密钥算法加密电路、 进行公开密钥算法加密;  Public key algorithm encryption circuit, performing public key algorithm encryption;
控制单元, 主要用于调用相关信息合成账号校验信息, 加密运算调用, 配置第一随  The control unit is mainly used to call the related information to synthesize the account verification information, the encryption operation call, and configure the first
9 机序列发生器, 根据解密后的同步信号作同步调整, 和客户端通过外围接口通讯。 第二随机序列发生器, 用于产生可配置的随机序列; 9 The machine sequence generator performs synchronous adjustment according to the decrypted synchronization signal, and communicates with the client through the peripheral interface. a second random sequence generator for generating a configurable random sequence;
公幵密钥算法解密电路,用非易失性存储器中储存的私钥对信息进行公开密钥算法 解密;  The public key algorithm decryption circuit decrypts the information by using a private key stored in the non-volatile memory;
动态解密电路, 对信息动态解密;  Dynamic decryption circuit for dynamically decrypting information;
所述的控制单元, 主要用于解密运算调用, 配置第二随机序列发生器等, 核实应 用服务器定时发送的信号经解密后所含的序列号与非易失性存储器中存储的序列号是否 一致, 根据解密后的同步信号作同步调整, 和客户端通过外围接口通讯。  The control unit is mainly used for decrypting the operation call, configuring the second random sequence generator, etc., and verifying whether the serial number included in the signal sent by the application server after decryption is consistent with the serial number stored in the non-volatile memory. According to the decrypted synchronization signal, the synchronization is adjusted, and the client communicates through the peripheral interface.
相应地, 所述的网络账号防盗装置也可以包括- ' 第一随机序列发生器, 用于产生可配置的随机序列;  Correspondingly, the network account anti-theft device may also include a first random sequence generator for generating a configurable random sequence;
非易失性存储器, 用于存储序列号、 帐号信息、 账号的用户密码(一般为账号用户 的高强度密码或二级密码)、 本地公钥、 私钥、 随机序列的系数因子等信息;  a non-volatile memory for storing serial number, account information, user password of an account (generally a high-strength password or a secondary password of an account user), a local public key, a private key, a coefficient factor of a random sequence, and the like;
公开密钥算法加密电路,对非易失性存储器中储存的账号校验信息和账户信息进行 公幵密钥算法加密;  The public key algorithm encryption circuit encrypts the account verification information and the account information stored in the non-volatile memory by a public key algorithm;
动态加密电路,对上述公开密钥算法加密结果用第一随机序列发生器产生的随机序 列进行动态加密;  The dynamic encryption circuit dynamically encrypts the encryption result of the public key algorithm by using a random sequence generated by the first random sequence generator;
控制单元, 主要用于调用相关信息合成账号校验信息, 加密运算调用, 配置第一随 机序列发生器, 根据解密后的同步信号对第一随机序列发生器作同步调整, 和客户端通 过外围接口通讯。  The control unit is mainly used for calling related information to synthesize account verification information, encrypting operation call, configuring the first random sequence generator, performing synchronous adjustment on the first random sequence generator according to the decrypted synchronization signal, and the client through the peripheral interface communication.
第二随机序列发生器, 用于产生可配置的随机序列;  a second random sequence generator for generating a configurable random sequence;
动态解密电路,用第二随机序列发生器产生的随机序列对应用服务器定时发送的经 过动态加密和公开密钥算法加密的校验握手信号进行动态解密;  The dynamic decryption circuit dynamically decrypts the verification handshake signal encrypted by the dynamic encryption and public key algorithm periodically sent by the application server by using a random sequence generated by the second random sequence generator;
公幵密钥算法解密电路,用非易失性存储器中储存的私钥对上述经动态解密的信息 进行公开密钥算法解密;  The public key algorithm decryption circuit decrypts the dynamically decrypted information by using a private key stored in the non-volatile memory;
所述的控制单元, 主要用于解密运算调用, 配置第二随机序列发生器等, 核实应用 服务器定时发送的信号经解密后所含的序列号与非易失性存储器中存储的序列号是否一 致, 根据来自应用服务器的解密后的同步信号同步第二随机序列发生器, 和客户端通过 外围接口通讯等。 进一步地, 所述的外接网络帐号防盗装置还包括:  The control unit is mainly used for decrypting the operation call, configuring the second random sequence generator, etc., and verifying whether the serial number included in the signal sent by the application server after decryption is consistent with the serial number stored in the non-volatile memory. And synchronizing the second random sequence generator according to the decrypted synchronization signal from the application server, communicating with the client through the peripheral interface, and the like. Further, the external network account anti-theft device further includes:
振荡器和锁相环, 其用于产生所需的各个频率的时钟信号;  An oscillator and a phase locked loop for generating a desired clock signal for each frequency;
存储器, 用于存放中间数据, 配合控制单元工作;  a memory for storing intermediate data and working with the control unit;
10 通路选择器, 用于选择不同的接口控制电路与客户端通信。 10 A path selector for selecting different interface control circuits to communicate with the client.
所述的网络账号防盗装置还可以包括- 与编程设备连接的编程外围接口, 该接口需要通讯协议与编程设备验证握手认证后 才能激活;  The network account anti-theft device may further comprise: a programming peripheral interface connected to the programming device, the interface needs to be activated by the communication protocol and the programming device verification handshake authentication;
所述的核心机密数据区设于非易失性存储器内, 用于存放私钥、 序列号等不允许在 编程设备以外的外部设备访问的核心机密数据;  The core confidential data area is disposed in a non-volatile memory, and is used for storing core confidential data such as a private key, a serial number, and the like that are not allowed to be accessed by an external device other than the programming device;
所述的控制单元, 可用于验证编程外围接口与编程设备的握手通讯协议, 并只让被 允许的特定的模块访问非易失性存储器中的核心机密数据区, 禁止可以和客户端连接的 接口电路访问核心机密数据区及各加解密电路的某些寄存器。 本发明将应用服务器端和外接加密防盗装置约定的动态序列作动态加密与公开密钥 算法加密有机结合, 并且客户端所有加密解密本身的任务调用、运算、中间结果的存放、 结果检验、 明文和密文的合成或分解都完全在该装置内进行(甚至装置内的单颗 S0C芯 片中进行), 与客户端软件无关,也不会在客户端硬盘留下数据痕迹,而且芯片内部有任 何模式下客户端都无法访问的非易式存贮器中的核心机密数据区, 所以能够严格防止网 络黑客通过窃听客户端及网络通信, 或者修改客户端软件, 从而获得盗用和非法进入用 户账号的手法, 最大限度保护个人网络账号及账号内的有形及无形资产的安全。 用户一个装置在手, 可以在联网的任意 PC、笔记本电脑等客户端登录不同或相同服 务内容的服务器上的多个账号。 而不必担心账号密码被非法记录、 窃听跟踪。 本发明由于网络账号防盗装置可以根据当前登录的客户端软件对应的特定应用号在 客户端显示并让客户选择当前需要登录的账号,并输入用于确认该装置主人身份的密码, 不需输入账号、 随机数字等, 所以登录使用便捷。 附图说明  The control unit can be used to verify the handshake communication protocol between the programming peripheral interface and the programming device, and only allow the allowed specific module to access the core confidential data area in the non-volatile memory, and prohibit the interface that can be connected with the client. The circuit accesses the core confidential data area and certain registers of each encryption and decryption circuit. The invention combines the dynamic sequence agreed by the application server end and the external encryption anti-theft device for dynamic encryption and public key algorithm encryption, and the task call, the operation, the storage of the intermediate result, the result check, the plaintext and the encryption and decryption of the client itself. The synthesis or decomposition of the ciphertext is completely carried out in the device (even in a single SOC chip in the device), regardless of the client software, and does not leave traces of data on the client hard disk, and there are any modes inside the chip. The core confidential data area in the non-transparent memory that the client cannot access, so it can strictly prevent the network hacker from stealing the client and network communication, or modifying the client software, thereby obtaining the method of stealing and illegally entering the user account. , to maximize the protection of personal network accounts and the security of tangible and intangible assets in the account. The user has one device at hand, and can log in to multiple accounts on servers of different or the same service content on a client such as any PC or laptop connected to the network. Don't worry about the account password being illegally recorded and eavesdropped. According to the invention, the network account anti-theft device can display on the client according to the specific application number corresponding to the currently logged-in client software and let the client select the account currently required to log in, and input a password for confirming the identity of the device owner, without inputting an account. , random numbers, etc., so login is easy to use. DRAWINGS
图 1是本发明的网络帐号防盗系统的结构示意图。  1 is a schematic structural diagram of a network account anti-theft system of the present invention.
图 2是本发明的外接网络帐号防盗装置的结构示意图。  2 is a schematic structural diagram of an external network account anti-theft device of the present invention.
图 3是本发明的网络帐号防盗方法的流程图。 具体实施方式  3 is a flow chart of the network account anti-theft method of the present invention. detailed description
如图 1所示:本发明的网络帐号防盗系统包括:外接网络帐号防盗装置 1,客户端 2,  As shown in FIG. 1 , the network account anti-theft system of the present invention includes: an external network account anti-theft device 1, a client 2,
11 应用服务器 4, 网络认证管理服务器 5, 编程设备 6, 所述外接网络帐号防盗装置与客户 端通过 USB、 串口、 红外、 蓝牙等各种通信接口连接, 所述客户端与应用服务器、 网络 认证管理服务器通过网络 3 (因特网、 局域网、 无线网等)相连接。 11 The application server 4, the network authentication management server 5, the programming device 6, the external network account anti-theft device and the client are connected through various communication interfaces such as USB, serial port, infrared, Bluetooth, etc., the client and the application server, and the network authentication management The servers are connected via a network 3 (Internet, local area network, wireless network, etc.).
所述外接网络帐号防盗装置, 其与客户端相连接, 用于将账号校验信息 (如内部存 储的账号用户密码(一般为账号用户的高强度密码或二级密码)、序列号、账号信息、校 验序列等)经过动态加密和公开密钥加密后生成向服务器请求登录的账号校验信息密文; 将向服务器请求登录的账号校验信息密文和帐号等通过客户端在网络上传给应用服务 器;  The external network account anti-theft device is connected to the client, and is used for verifying account information (such as an internally stored account user password (generally an account user's high-intensity password or a second-level password), a serial number, and an account information. After the dynamic encryption and public key encryption, the account verification information ciphertext that requests the login to the server is generated; the account verification information ciphertext and the account number that are requested to log in to the server are uploaded to the network through the client. application server;
所述的应用服务器, 其将向服务器请求登录的账号校验信息密文经过公开密钥算法 解密和动态解密,核查账号的用户密码(一般为账号用户的高强度密码或二级密码)、序 列号等信息, 査验所有信息是否无误, 无误则允许接入, 有误则停止接入。  The application server, which requests the login account verification information ciphertext from the server to be decrypted and dynamically decrypted by the public key algorithm, and checks the user password of the account (generally the high-strength password or the secondary password of the account user) and the sequence. No information, etc., to check whether all information is correct, if it is correct, access is allowed, and if there is an error, access is stopped.
所述编程设备, 用于在通过安全握手通讯协议检查后, 对外接网络账号防盗装置内 的非易失性存储器中的核心机密数据区和其他区域进行编程。  The programming device is configured to program the core confidential data area and other areas in the non-volatile memory in the external network account anti-theft device after being checked by the secure handshake communication protocol.
如图 2所示: 所述外接网络帐号防盗装置包括:  As shown in FIG. 2, the external network account anti-theft device includes:
非易失性存储器 11, 用于存储随机序列的系数因子、 序列号、 帐号信息、 账号的用 户密码 (一般为账号用户的髙强度密码或二级密码)、 本地公钥、 私钥等信息;  The non-volatile memory 11 is configured to store a coefficient component of the random sequence, a serial number, account information, a user password of the account (generally an account strength password or a secondary password of the account user), a local public key, a private key, and the like;
第一随机序列发生器 7,用于根据非易失存储器 11内储存的系数因子产生可配置的 随机序列;  The first random sequence generator 7 is configured to generate a configurable random sequence according to a coefficient factor stored in the nonvolatile memory 11;
动态加密电路 8, 利用对第一随机序列发生器 7产生的随机序列, 对非易失性存储 器 11中储存的序列号、 帐户信息等进行动态加密;  The dynamic encryption circuit 8 dynamically encrypts the serial number, account information, and the like stored in the nonvolatile memory 11 by using a random sequence generated by the first random sequence generator 7.
公开密钥加密电路 9, 将上述动态加密后的信息再进行公开密钥加密;  The public key encryption circuit 9 performs the public key encryption on the dynamically encrypted information;
第二随机序列发生器 19, 用于根据非易失存储器 11内储存的系数因子产生可配置 的随机序列;  a second random sequence generator 19, configured to generate a configurable random sequence according to a coefficient factor stored in the nonvolatile memory 11;
公开密钥解密电路 16, 用非易失性性存储器 11中储存的私钥对应用服务器定时发 送的经过动态加密和公开密钥算法加密的校验握手信号进行公开密钥算法解密;  The public key decryption circuit 16 performs a public key algorithm decryption on the verification handshake signal encrypted by the dynamic encryption and public key algorithm periodically sent by the application server by using the private key stored in the nonvolatile memory 11;
动态解密电路 17, 对上述经公开密钥解密的信息再用第二随机序列发生器 19产生 的随机序列动态解密;  The dynamic decryption circuit 17, the information decrypted by the public key is dynamically decrypted by the random sequence generated by the second random sequence generator 19;
控制电路 10,用于主要用于调用相关信息合成账号校验信息, 加解密运算调用, 配 置第一随机序列发生器, 核实应用服务器定时发送的信号经解密后所含的序列号与非易 失性存储器 11中存储的序列号是否一致。配置第一随机序列发生器 Ί和第二随机序列发 生器 19及其他模块,根据同步调整信号触发第一随机序列发生器 7和第二随机序列发生 器 19作同步调整, 控制接口电路完成和客户端的通讯协议。 The control circuit 10 is configured to be used for calling the related information to synthesize the account verification information, and the encryption and decryption operation is called to configure the first random sequence generator to verify the serial number and the nonvolatile state of the signal sent by the application server after being decrypted. Whether the serial numbers stored in the sexual memory 11 are identical. Configuring a first random sequence generator Ί and a second random sequence The generator 19 and other modules trigger the first random sequence generator 7 and the second random sequence generator 19 to perform synchronization adjustment according to the synchronization adjustment signal, and the control interface circuit completes the communication protocol with the client.
振荡器和锁相环 21, 其用于产生所需的各个频率的时钟信号 f An oscillator and phase-locked loop 21 for generating a desired clock signal for each frequency f
存储器 18, 用于存放中间数据, 配合控制单元 10工作。  The memory 18 is configured to store intermediate data and cooperate with the control unit 10.
通路选择器 12, 用于选择不同的接口控制电路 13、 14与客户端 2通信, 与编程设备连接的编程外围接口 15,该接口需要通讯握手协议与编程设备握手验证 后才能激活, 用于在安全模式下使用账号防盗系统专用编程设备 6访问和烧录非易失存 储器 11中的核心数据区 20和其他数据区。 - 所述的核心机密数据区 20设于非易失性存储器 11内, 用于存放私钥、 序列号等不 允许在专用编程设备以外的外部设备访问的核心机密数据;  The path selector 12 is configured to select a different interface control circuit 13, 14 to communicate with the client 2, and a programming peripheral interface 15 connected to the programming device, the interface needs to be authenticated by the communication handshake protocol and the programming device to be activated, The core data area 20 and other data areas in the nonvolatile memory 11 are accessed and burned using the account security system dedicated programming device 6 in the secure mode. - the core confidential data area 20 is disposed in the non-volatile memory 11 for storing core secret data such as a private key, a serial number, and the like that are not allowed to be accessed by an external device other than the dedicated programming device;
所述的控制单元 10, 还可用于验证编程外围接口 15与专用编程设备的通讯握手协 议, 并只让被允许的特定的模块(如激活的编程外围接口 15、 随机序列发生器、 公开密 钥加解密电路、 动态加解密电路等)可以访问非易失性存储器 11 中的核心机密数据区 20,禁止可以和客户端连接的接口电路访问核心机密数据区 20及各加解密电路的某些寄 存器。  The control unit 10 can also be used to verify the communication handshake protocol of the programming peripheral interface 15 and the dedicated programming device, and only allow the specific module to be allowed (such as the activated programming peripheral interface 15, the random sequence generator, the public key). The encryption and decryption circuit, the dynamic encryption/decryption circuit, etc. can access the core confidential data area 20 in the non-volatile memory 11, and prohibit the interface circuit that can be connected to the client from accessing the core confidential data area 20 and some registers of the encryption and decryption circuits. .
采用本发明在任何模式下都不能通过客户端接口 13或 14访问非易失性存储器中的 核心机密数据区。 所以, 黑客也无法通过网络和客户端访问、 偷取或篡改核心机密区的 数据。  With the present invention, the core secret data area in the non-volatile memory cannot be accessed through the client interface 13 or 14 in any mode. Therefore, hackers cannot access, steal, or tamper with data in core secret areas through the network and clients.
进一步, 所述的网络认证服务器或应用服务器, 用于发送收到同步调整信号 (通过 网络以公开密钥算法加密密文方式传输)给外接网络账号防盗装置, 从而触发第一随机 序列发生器 7和第二随机序列发生器 19作同步调整 (例如, 在同步点状态复位), 以保 持与网络认证管理服务器 5或应用服务器 4的随机序列同步 (即使得随机序列发生器所 处状态一致, 如都复位成初始状态)。  Further, the network authentication server or the application server is configured to send a synchronization adjustment signal (transmitted by the public key algorithm to encrypt the ciphertext mode) to the external network account anti-theft device, thereby triggering the first random sequence generator 7 Synchronizing with the second random sequence generator 19 (e.g., resetting at the synchronization point state) to maintain synchronization with the random sequence of the network authentication management server 5 or the application server 4 (i.e., causing the random sequencer to be in a consistent state, such as Both are reset to their initial state).
所述动态加密电路 8和公开密钥加密电路 9在数据通路中的先后顺序可以互换, 公 开密钥解密电路 16和动态解密电路 17在数据通路中的先后顺序也可以互换, 但要和服 务器的加解密次序相对应。 ' 结合图 3所示: 本发明的网络帐号防盗方法的主要流程如下:  The order of the dynamic encryption circuit 8 and the public key encryption circuit 9 in the data path may be interchanged, and the order of the public key decryption circuit 16 and the dynamic decryption circuit 17 in the data path may also be interchanged, but The encryption and decryption order of the server corresponds. As shown in Figure 3, the main process of the network account anti-theft method of the present invention is as follows:
每个外接网络防盗装置 1都在内部的非易失性存储器 11中烧录了唯一的序列号。任 意两个外接网络防盗装置 1之间的序列号都不同。 外接网络帐号防盗装置中的非易失性 存储器 11中还存放了应用号、密钥、随机序列发生器因子等,以及用户的多个网络账号、  Each external network anti-theft device 1 has a unique serial number burned in the internal non-volatile memory 11. The serial number between any two external network anti-theft devices 1 is different. The non-volatile memory 11 in the external network account anti-theft device also stores an application number, a key, a random sequence generator factor, and the like, and a plurality of network accounts of the user,
13 密码和相关信息。 13 Password and related information.
步骤 1、 用户将外接网络帐号防盗装置 1接入客户端 2,  Step 1. The user connects the external network account anti-theft device 1 to the client 2,
步骤 2、 控制单元 10配置外接网络账号防盗装置 1中其他各模块,  Step 2. The control unit 10 configures other modules in the external network account anti-theft device 1
步骤 3、 用户客户端 2打开客户端应用程序登录界面,  Step 3. User client 2 Open the client application login interface.
步骤 4、客户端登录程序发送应用服务代码或特征字到外接网络帐号防盗装置装置, 告知外接网络帐号防盗装置 1当前登录哪个应用 (如运营商 A提供的服务平台 B), 步骤 5、 外接网络帐号防盗装置将内部存储的该应用服务代码或特征字下的所有帐 号发送给客户端:  Step 4: The client login program sends the application service code or feature word to the external network account anti-theft device, and informs the external network account anti-theft device 1 which application is currently logged in (such as the service platform B provided by the operator A), step 5, the external network The account anti-theft device sends all the accounts under the application service code or feature word stored internally to the client:
外接网络帐号防盗装置 1会将非易失性存储桊 11中的该种应用(如运营商 A提供的 服务平台 B) 下的所有网络账号发给客户端 2;  The external network account anti-theft device 1 sends all the network accounts under the non-volatile storage port 11 (such as the service platform B provided by the operator A) to the client 2;
步骤 6、 客户端登录程序显示网络账号防盗装置 1在该种应用下的所有帐号, 并由 用户选择本次欲登录的账号, (如果只有一个, 则可以自动选定):  Step 6. The client login program displays the network account anti-theft device 1 for all accounts under the application, and the user selects the account to be logged in. (If there is only one, it can be automatically selected):
步骤 7、 用户填入登录密码(多个账号可以用同一个密码, 也可以用不同密码, 该 密码也可以是外接网络帐号防盗装置的主人密码或用户较易记忆的初级密码);.  Step 7. The user fills in the login password (multiple accounts can use the same password, or different passwords, which can also be the owner password of the external network account anti-theft device or the primary password that the user can easily remember);
步骤 8、 客户端 2的客户端登录程序将用户所选账号密码通过接口传输给外接网络 帐号防盗装置 1。 ■  Step 8. The client login program of the client 2 transmits the password of the account selected by the user to the external network account anti-theft device through the interface. ■
步骤 9、外接网络帐号防盗装置 1核查确认账号密码是否无误; 如有误则停止登陆, 如密码正确, 则继续步骤 10;  Step 9, external network account anti-theft device 1 check to confirm whether the account password is correct; if there is a mistake, stop logging in, if the password is correct, continue to step 10;
步骤 10、 控制单元 10, 将非易失性存储器 11中存放的序列号、 所选账号对应的用 户密码(一般为账号用户的高强度密码或二级密码,不是装置的主人密码)、帐户内的必 要信息、校验序列等组成账号校验信息, 和第一随机序列发生器 7产生的随机序列一起, 经动态加密电路 8进行动态加密, 将加密结果再经公开密钥算法加密电路 9进行加密后 生成登陆请求密文;(所述的动态加密算法及公开密钥加密算法均是现有技术,可采用多 种方式来实现, 比如, 本具体实施例中, 动态加密的方法具体为, 将第一随机序列发生 器 7产生的可配置随机系列与非易失性存储器 Π中存放的序列号、对应账户内的必要信 息等数据进行逐位异或运算)。 (公开密钥算法和动态加密算法的次序可交换, 但需和应 用服务器解密运算次序对应)  Step 10, the control unit 10, the serial number stored in the non-volatile memory 11, the user password corresponding to the selected account (generally the high-intensity password or the second-level password of the account user, not the owner password of the device), and the account The necessary information, the check sequence, and the like constitute account verification information, and together with the random sequence generated by the first random sequence generator 7, are dynamically encrypted by the dynamic encryption circuit 8, and the encrypted result is further subjected to the public key algorithm encryption circuit 9. After the encryption, the login request ciphertext is generated; (the dynamic encryption algorithm and the public key encryption algorithm are both prior art and can be implemented in various manners. For example, in the specific embodiment, the dynamic encryption method is specifically The configurable random series generated by the first random sequence generator 7 is subjected to a bitwise exclusive OR operation with data such as a serial number stored in the nonvolatile memory port, necessary information in the corresponding account, and the like. (The order of the public key algorithm and the dynamic encryption algorithm can be exchanged, but it needs to correspond to the application server decryption operation order)
步骤 11、外接网络帐号防盗装置将向服务器请求登录的账号校验信息密文和帐号等 传给客户端 2;  Step 11, the external network account anti-theft device will request the login account verification information ciphertext and account number to the server 2 to the client 2;
步骤 12、客户端 2的应用登录程序通过网络 3将请求登录的账号校验信息密文和帐  Step 12: The application login program of the client 2 passes the network 3 to check the account verification information ciphertext and account of the login.
14 号等传给应用服务器 4; 14 The number is transmitted to the application server 4;
步骤 13、应用服务器 4会将请求登录的账号校验信息密文经过公开密钥算法和动态 解密,核查账号的用户密码(一般为账号用户的高强度密码或二级密码)、序列号等信息; 步骤 14、应用服务器 4查验所有信息是否无误。如果有误则停止登陆, 如果无误继 续步骤 15;  Step 13: The application server 4 passes the public key algorithm and dynamic decryption of the account verification information cipher requesting to log in, and checks the user password of the account (generally the high-strength password or the secondary password of the account user), the serial number, and the like. Step 14. The application server 4 checks whether all the information is correct. If there is an error, stop logging in, if it is correct, continue with step 15;
步骤 15、应用服务器通知客户端, 于是客户端 2的客户端软件和应用服务器 4的服 务器端软件正常为用户接入服务。  Step 15. The application server notifies the client, and the client software of the client 2 and the server software of the application server 4 normally serve the user.
进一步地, 本发明还可以包括: 应用服务器 4可以根据运营商的需要选择是否定时 和与客户端 2相连的外接网络帐号防盗装置 1用加密的方法握手确认登录始终有效。  Further, the present invention may further include: the application server 4 may select whether to time and the external network account anti-theft device connected to the client 2 according to the needs of the operator. 1 The handshake is confirmed by an encrypted method to confirm that the login is always valid.
步骤 16、应用服务器 4定时发送经过动态加密和公开密钥算法加密的校验握手信号 经客户端 2给外接网络帐号防盗装置 1 ;  Step 16. The application server 4 periodically sends the verification handshake signal encrypted by the dynamic encryption and the public key algorithm to the external network account anti-theft device through the client 2;
步骤 17、外接网络帐号防盗装置将校验握手信号解密核实: 先经公开密钥解密电路 16用非易失性存储器 11中的私钥用公开密钥算法解密,然后再经动态解密电路 17用第 二随机序列器发生器 19产生的序列动态解密。 控制单元 10确认应用服务器 4发送的数 据解密后所含的序列号与用户所用的当前本地外接网络帐号防盗装置 1的序列号对照确 认无误;(公开密钥算法和动态解密算法的次序可交换,但需和应用服务器加密运算次序 对应)  Step 17: The external network account anti-theft device decrypts and verifies the verification handshake signal: first, the public key decryption circuit 16 decrypts the private key in the non-volatile memory 11 with a public key algorithm, and then uses the dynamic decryption circuit 17 The sequence generated by the second random sequencer generator 19 is dynamically decrypted. The control unit 10 confirms that the serial number contained in the data sent by the application server 4 is confirmed in comparison with the serial number of the current local external network account anti-theft device 1 used by the user; (the order of the public key algorithm and the dynamic decryption algorithm can be exchanged, But it needs to correspond to the application server encryption operation order)
步骤 18、外接网络帐号防盜装置 1将第一随机序列发生器 7产生的随机序列、非易 失性存储器 11中存放的序列号和对应帐户内的必要信息等,经过动态加密电路 8动态加 密和公开密钥加密电路 9公开密钥加密后生成握手应答文;(公开密钥算法和动态加密算 法的次序可交换, 但需和应用服务器解密运算次序对应)  Step 18: The external network account anti-theft device 1 dynamically encrypts the random sequence generated by the first random sequence generator 7, the serial number stored in the non-volatile memory 11, and the necessary information in the corresponding account through the dynamic encryption circuit 8. The public key encryption circuit 9 generates a handshake response message after public key encryption; (the order of the public key algorithm and the dynamic encryption algorithm can be exchanged, but needs to correspond to the application server decryption operation order)
步骤 19、外接网络帐号防盗装置将所产生的握手应答密文和帐号等通过客户端 2从 网络 3上传给应用服务器 4;  Step 19: The external network account anti-theft device uploads the generated handshake response ciphertext and account number from the network 3 to the application server 4 through the client 2;
步骤 20、 应用服务器 4会将握手应答密文经过公开密钥算法解密和动态解密 步骤 21、 应用服务器 4查验所有信息是否无误, 如果无误, 维持正常登录; 否则退 出登录, 停止为客户端的客户端软件作用户服务。  Step 20: The application server 4 decrypts the handshake response ciphertext through the public key algorithm and the dynamic decryption step 21, and the application server 4 checks whether all the information is correct. If the error is correct, the normal login is maintained; otherwise, the login is stopped, and the client is stopped. Software for user service.
服务器端可以根据网络应用的需要选择是否定时和用户端的外接网络帐号防盗装置 用加密的方法握手确认登录始终有效, 该握手应该自动进行, 在外接网络帐号防盗装置 正常、 有效的情况下, 不需用户人工介入, 不干扰应用程序运行。  The server can select whether to synchronize with the external network account of the user terminal according to the needs of the network application. The anti-theft device uses an encrypted method to confirm that the login is always valid. The handshake should be automatically performed. In the case that the external network account anti-theft device is normal and effective, it is not required. The user manually intervenes and does not interfere with the application running.
客户端 2的应用软件退出登录时, 将提示用户取走外接网络帐号防盗装置 1并妥善  When the application software of client 2 logs out, the user will be prompted to take the external network account anti-theft device 1 and properly
15 保管, 并通知应用服务器 4该用户本次服务已退出。 15 Custody, and notify the application server 4 that the user has logged out of this service.
外接加密防盗装置在非易失性存储器 11中预留并提供多个应用服务代码或特征字,其中 部分或全部应用服务代码或特征字在该网络账号防盗装置出售或颁发给网络账号各用户 时尚未绑定任何应用服务。 在该网络账号防盗装置出售或颁发给网络账号各用户后, 在 不需更改核心机密数据区的情况下, 可以追加绑定应用服务, 并保存与该应用服务有关 的全部帐号等信息。 The external encryption anti-theft device reserves and provides a plurality of application service codes or feature words in the non-volatile memory 11, wherein some or all of the application service codes or feature words are sold or issued to the network account anti-theft device for each user's fashion. No application services are bound. After the network account anti-theft device is sold or issued to each user of the network account, the application service may be additionally bound and the account information related to the application service may be saved without changing the core confidential data area.
16 16

Claims

权利要求 Rights request
1、 一种网络帐号防盗方法, 其特征在于, 包括如下步骤: A network account anti-theft method, characterized in that the method comprises the following steps:
a、 在客户端连接一拥有唯一序列号的外接网络帐号防盗装置;  a. Connect an external network account anti-theft device with a unique serial number on the client;
b、外接网络帐号防盗装置将帐号校验信息经过加密后生成向服务器请求登录的账号 校验信息密文;  b. The external network account anti-theft device encrypts the account verification information to generate an account verification information ciphertext requesting to log in to the server;
c、外接网络帐号防盗装置将请求登录的账号校验信息密文与帐号通过客户端在网络 上传给应用服务器;  c. The external network account anti-theft device uploads the account verification information ciphertext and the account number that are requested to log in to the application server through the client;
d、应用服务器将来自外接网络帐号防盗装置的请求登录的账号校验信息密文经过解 密, 核査账号校验信息;  d. The application server decrypts the account verification information cipher that is requested to be logged in from the external network account anti-theft device, and checks the account verification information;
e、 应用服务器査验所有信息是否无误, 无误则允许接入, 有误则停止接入; 其中, 加密解密本身的任务调用、运算、 中间结果的存放、 结果检验、 明文和密文 的合成或分解, 完全在外接网络帐号防盗装置内部进行。  e. The application server checks whether all the information is correct. If it is correct, the access is allowed. If there is an error, the access is stopped. Among them, the task of the encryption and decryption itself, the operation, the storage of the intermediate result, the result check, the synthesis of the plaintext and the ciphertext or Decomposition, completely inside the external network account anti-theft device.
2、 根据权利要求 1所述的一种网络帐号防盗方法, 其特征在于, 所述的帐号校验 信息包括: 账号用户密码、 外接网络帐号防盗装置的序列号, 或者, 还可以包括检验序 列。  2. The network account anti-theft method according to claim 1, wherein the account verification information comprises: an account user password, a serial number of the external network account anti-theft device, or a verification sequence.
3、 根据权利要求 1所述的网络帐号防盗方法, 其特征在于, 还包括如下步骤: 应用服务器定时发送经过动态加密和公开密钥算法加密的校验握手信号; 外接网络帐号防盗装置将校验握手信号解密核实;  3. The network account anti-theft method according to claim 1, further comprising the steps of: the application server periodically transmitting a verification handshake signal encrypted by a dynamic encryption and a public key algorithm; the external network account anti-theft device will verify Handshake signal decryption verification;
外接网络帐号防盗装置生成经过加密生成握手应答密文;  The external network account anti-theft device generates an encrypted handshake response ciphertext generated by the encryption;
外接网络帐号防盗装置将握手应答密文和账号等通过客户端在网络上传给应用服 务器;  The external network account anti-theft device uploads the handshake response ciphertext and the account number to the application server through the client through the network;
应用服务器将握手应答密文经过解密;  The application server decrypts the handshake response ciphertext;
应用服务器查验所有信息是否无误, 无误则继续服务, 有误则停止已接入的应用服 务。  The application server checks whether all the information is correct, and continues to service if there is no error. If it is wrong, the connected application service is stopped.
4、 根据权利要求 1或 3所述的网络账号防盗方法, 其特征在于, 还包括如下步骤: 当需要退出客户端应用登录时, 客户端发出退出服务请求给应用服务器, 应用服务 器停止所接入的服务;  The network account anti-theft method according to claim 1 or 3, further comprising the following steps: when the client application login needs to be logged out, the client sends an exit service request to the application server, and the application server stops the access. Service
客户端提示用户取走外接网络帐号防盗装置。  The client prompts the user to take the external network account anti-theft device.
2 2
5、根据权利要求 1所述的网络账号防盗方法,其特征在于,所述的步骤 a与步骤 b 之间还包括如下步骤: The network account anti-theft method according to claim 1, wherein the step a and the step b further comprise the following steps:
调用客户端应用登录程序;  Call the client application login program;
客户端登录程序发送对应当前登录应用的应用服务代码或特征字到外接网络帐号 防盗装置;  The client login program sends an application service code or feature word corresponding to the currently logged-in application to the external network account anti-theft device;
外接网络帐号防盗装置将内部存储的该应用服务代码或特征字下的所有帐号发送 给客户端;  The external network account anti-theft device sends all the accounts under the application service code or feature word stored in the internal to the client;
客户端登录程序显示从外接网络帐号防盗装置接收的所有帐号供用户选择;用户在 客户端选择登录账号, 输入登录密码;  The client login program displays all the accounts received from the external network account anti-theft device for the user to select; the user selects the login account on the client, and inputs the login password;
客户端登录程序将所选账号信息、 登录密码发送到外接网络帐号防盗装置; 外接网络帐号防盗装置检査客户端发来的账号信息和登录密码是否无误,如果有误 则停止登陆, 如果无误, 则继续步骤 b。  The client login program sends the selected account information and login password to the external network account anti-theft device; the external network account anti-theft device checks whether the account information and the login password sent by the client are correct, and if not, stop logging in, if not, Then proceed to step b.
6、 根据权利要求 5所述的网络帐号防盗方法, 其特征在于, 所述的登陆密码可以 是外接网络帐号防盗装置的主人密码或用户较易记忆的初级密码。  The network account anti-theft method according to claim 5, wherein the login password is a master password of the external network account anti-theft device or a primary password that is more easily remembered by the user.
7、根据权利要求 1所述的网络账号防盗方法,其特征在于,在所述外接网络帐号防 盗装置中存储多个应用服务代码或特征字, 并允许其中部分或全部应用服务代码或特征 字在该外接网络帐号防盗装置出售或颁发给网络账号各用户时尚未绑定任何应用服务, 在该外接网络账号防盗装置出售或颁发给网络账号各用户后, 在不需更改核心机密数据 区的情况下, 追加绑定应用服务。  The network account anti-theft method according to claim 1, wherein a plurality of application service codes or feature words are stored in the external network account anti-theft device, and part or all of the application service codes or feature words are allowed to be When the external network account anti-theft device is sold or issued to each user of the network account, no application service is bound, and after the external network account anti-theft device is sold or issued to each user of the network account, without changing the core confidential data area, , append the binding application service.
8、根据权利要求 1所述的网络帐号防盗方法,其特征在于, 网络认证服务器或应用 服务器发送经过加密的同步调整信号给外接网络帐号防盗装置, 外接网络帐号防盗装置 收到后, 作同步调整。  The network account anti-theft method according to claim 1, wherein the network authentication server or the application server sends the encrypted synchronization adjustment signal to the external network account anti-theft device, and the external network account anti-theft device receives the synchronization adjustment. .
9、 一种网络帐号防盗系统, 其特征在于, 包括: 客户端; 及:  9. A network account anti-theft system, comprising: a client; and:
外接网络帐号防盗装置, 与客户端相连接, 用于将账号校验信息等经过动态加密和 公开密钥算法加密后生成向服务器请求登录的账号校验信息密文; 将请求登录的账号校 验信息密文和帐号等通过客户端在网络上传给应用服务器; 所述每个外接网络帐号防盗 装置均拥有唯一的序列号,且内部设有任何模式下客户端都无法访问的核心机密数据区。  The external network account anti-theft device is connected to the client, and is used for encrypting the account verification information and the like by the dynamic encryption and the public key algorithm to generate an account verification information ciphertext for requesting login to the server; The information ciphertext and the account number are uploaded to the application server on the network through the client; each of the external network account anti-theft devices has a unique serial number, and the core confidential data area that the client cannot access in any mode is internally provided.
应用服务器,其将外接网络帐号防盗装置请求登录的账号校验信息密文经过公开密 钥算法解密和动态解密,核查账号校验信息,查验所有信息是否无误,无误则允许接入, 有误则停止接入;  The application server, which decrypts and dynamically decrypts the account verification information ciphertext requested by the external network account anti-theft device through the public key algorithm, checks the account verification information, checks whether all the information is correct, and allows access without error. Stop accessing;
3 编程设备, 用于在通过安全握手通讯协议检查后, 对外接网络账号防盗装置内的非 易失性存储器中的核心机密数据区进行编程。 3 The programming device is configured to program the core confidential data area in the non-volatile memory in the external network account anti-theft device after checking by the secure handshake communication protocol.
10、 根据权利要求 9所述的网络帐号防盗系统, 其特征在于, 所述的外接网络帐号 防盗装置包括:  The network account anti-theft system according to claim 9, wherein the external network account anti-theft device comprises:
第一随机序列发生器(7), 用于产生可配置的随机序列;  a first random sequence generator (7) for generating a configurable random sequence;
非易失性存储器(11 ), 用于存储序列号、 帐号信息、 账号的用户密码、 本地公钥、 私钥、 随机序列的系数因子等信息;  a non-volatile memory (11) for storing serial number, account information, user password of an account, a local public key, a private key, a coefficient factor of a random sequence, and the like;
动态加密电路 (8), 进行动态加密;  Dynamic encryption circuit (8) for dynamic encryption;
公开密钥算法加密电路 (9)、 将进行公开密钥算法加密;  Public key algorithm encryption circuit (9), which will perform public key algorithm encryption;
控制单元 (10), 主要用于调用相关信息合成账号校验信息, 加密运算调用, 配置 第一随机序列发生器, 根据解密后的同步信号对第一随机序列发生器作同步调整, 和客 户端通过外围接口通讯。  The control unit (10) is mainly used for calling related information to synthesize account verification information, encrypting the operation call, configuring the first random sequence generator, performing synchronous adjustment on the first random sequence generator according to the decrypted synchronization signal, and the client Communication via the peripheral interface.
11、 根据权利要求 9所述的网络帐号防盗系统, 其特征在于, 所述的网络账号防盗 装置包括:  The network account anti-theft system according to claim 9, wherein the network account anti-theft device comprises:
第一随机序列发生器 (7), 用于产生可配置的随机序列;  a first random sequence generator (7) for generating a configurable random sequence;
非易失性存储器(11), 用于存储序列号、 帐号信息、 账号的用户密码、 本地公钥、 私钥、 随机序列的系数因子等信息;  a non-volatile memory (11) for storing serial number, account information, user password of an account, a local public key, a private key, a coefficient factor of a random sequence, and the like;
公开密钥算法加密电路 (9), 对非易失性存储器 (11 ) 中储存的账号校验信息和账 户信息进行公开密钥算法加密;  The public key algorithm encryption circuit (9) encrypts the account verification information and the account information stored in the non-volatile memory (11) by a public key algorithm;
动态加密电路 (8), 进行动态加密;  Dynamic encryption circuit (8) for dynamic encryption;
控制单元 (10), 主要用于调用相关信息合成账号校验信息, 加密运算调用, 配置第 一随机序列发生器, 根据解密后的同步信号作同步调整, 和客户端通过外'围接口通讯。 16、根据权利要求 14所述的网络帐号防盗系统,其特征在于,所述的外接网络帐号防盗 装置还包括:  The control unit (10) is mainly used to call the related information to synthesize the account verification information, the encryption operation call, configure the first random sequence generator, perform synchronous adjustment according to the decrypted synchronization signal, and communicate with the client through the external interface. The network account anti-theft system according to claim 14, wherein the external network account anti-theft device further comprises:
第二随机序列发生器 (19), 用于产生可配置的随机序列;  a second random sequence generator (19) for generating a configurable random sequence;
公开密钥算法解密电路 (16),用非易失性存储器 (11)中储存的私钥对信息进行公开 密钥算法解密;  The public key algorithm decryption circuit (16) decrypts the information by using a private key stored in the non-volatile memory (11);
动态解密电路 (17), 对信息进行动态解密;  a dynamic decryption circuit (17) for dynamically decrypting information;
所述的控制单元 (10), 主要用于解密运算调用, 配置第二随机序列发生器等, 核实 应用服务器定时发送的信号经解密后所含的序列号与非易失性存储器中存储的序列号是  The control unit (10) is mainly used for decrypting the operation call, configuring the second random sequence generator, etc., and verifying the serial number contained in the signal sent by the application server after being decrypted and the sequence stored in the non-volatile memory. Number is
4 否一致, 根据解密后的同步信号作同步调整, 和客户端通过外围接口通讯。 4 No, the synchronization is adjusted according to the decrypted synchronization signal, and the client communicates with the peripheral interface.
12、 根据权利要求 10所述的网络帐号防盗系统, 其特征在于, 所述的外接网络账 号防盗装置还包括:  The network account anti-theft system according to claim 10, wherein the external network account anti-theft device further comprises:
第二随机序列发生器 (19), 用于产生可配置的随机序列;  a second random sequence generator (19) for generating a configurable random sequence;
动态解密电路 (17),用第二随机序列发生器 (19)产生的随机序列对应用服务器定时 发送的经过动态加密和公开密钥算法加密的校验握手信号进行动态解密;  The dynamic decryption circuit (17) dynamically decrypts the verification handshake signal sent by the application server and dynamically encrypted by the dynamic encryption and public key algorithm by using a random sequence generated by the second random sequence generator (19);
公开密钥算法解密电路 (16),用非易失性存储器 (11)中储存的私钥对上述经动态解 密的信息进行公开密钥算法解密;  a public key algorithm decryption circuit (16) for decrypting the dynamically decrypted information by a public key algorithm using a private key stored in the non-volatile memory (11);
所述的控制单元(10), 主要用于解密运算调用, 配置第二随机序列发生器等, 核 实应用服务器定时发送的信号经解密后所含的序列号与非易失性存储器中存储的序列号 是否一致, 根据来自应用服务器的解密后的同步信号同步第二随机序列发生器, 和客户 端通过外围接口通讯等。  The control unit (10) is mainly used for decrypting the operation call, configuring the second random sequence generator, etc., and verifying the serial number contained in the signal sent by the application server after being decrypted and the sequence stored in the non-volatile memory. Whether the numbers are consistent, the second random sequence generator is synchronized according to the decrypted synchronization signal from the application server, and the client communicates through the peripheral interface.
13、 根据权利要求 9或 10所述的的网络帐号防盗系统, 其特征在于, 所述的外接 网络帐号防盗装置还包括:  The network account anti-theft device according to claim 9 or 10, wherein the external network account anti-theft device further comprises:
振荡器和锁相环(21 ) , 其用于产生所需的各个频率的时钟信号;  An oscillator and a phase locked loop (21) for generating a desired clock signal for each frequency;
存储器(18) , 用于存放中间数据, 配合控制单元工作; 通路选择器(12), 用于选 择不同的接口控制电路与客户端通信。  The memory (18) is used for storing intermediate data and works with the control unit; the path selector (12) is for selecting different interface control circuits to communicate with the client.
14、根据权利要求 13所述的网络帐号防盗系统,其特征在于,所述的网络账号防盗 装置包括:  The network account anti-theft system according to claim 13, wherein the network account anti-theft device comprises:
与编程设备 (6)连接的编程外围接口 (15), 其用于连接编程设备 (6), 该接口需 要通讯协议与编程设备验证握手认证后才能激活;  a programming peripheral interface (15) connected to the programming device (6) for connecting the programming device (6), which requires activation of the communication protocol and the programming device verification handshake authentication;
所述的核心机密数据区 (20) 设于非易失性存储器(11 ) 内, 用于存放私钥、 序列 号等不允许编程设备(6) 以外的外部设备访问的核心机密数据;  The core confidential data area (20) is disposed in the non-volatile memory (11) for storing core confidential data such as a private key and a serial number that are not allowed to be accessed by an external device other than the programming device (6);
所述的控制单元(10),可用于验证编程外围接口(15)与编程设备的握手通讯协议, 并只让被允许的特定的模块访问非易失性存储器(11 )中的核心机密数据区(20),禁止 可以和客户端连接的接口电路访问核心机密数据区(20)及各加解密电路的某些寄存器。  The control unit (10) can be used to verify the handshake communication protocol between the programming peripheral interface (15) and the programming device, and only allow the allowed specific module to access the core confidential data area in the non-volatile memory (11). (20), prohibiting the interface circuit that can be connected to the client to access the core confidential data area (20) and some registers of each encryption and decryption circuit.
PCT/CN2007/000294 2006-01-26 2007-01-26 A theft protection system for network account and a method thereof WO2007087748A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN200610023658.X 2006-01-26
CN 200610023658 CN1808975B (en) 2006-01-26 2006-01-26 System and method of preventing network account from stolen

Publications (1)

Publication Number Publication Date
WO2007087748A1 true WO2007087748A1 (en) 2007-08-09

Family

ID=36840682

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2007/000294 WO2007087748A1 (en) 2006-01-26 2007-01-26 A theft protection system for network account and a method thereof

Country Status (2)

Country Link
CN (1) CN1808975B (en)
WO (1) WO2007087748A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110535850A (en) * 2019-08-26 2019-12-03 腾讯科技(武汉)有限公司 Treating method and apparatus, storage medium and the electronic device that account number logs in
CN111711628A (en) * 2020-06-16 2020-09-25 北京字节跳动网络技术有限公司 Network communication identity authentication method, device, system, equipment and storage medium

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101170676B (en) * 2007-11-19 2010-09-29 中兴通讯股份有限公司 Method and system for encrypting user login information in interactive network TV system
CN102523503B (en) * 2011-12-19 2014-08-20 华为技术有限公司 Video-on-demand control method and relative device and system
CN108322508B (en) * 2017-12-28 2021-07-13 天地融科技股份有限公司 Method and system for executing security operation by using security device
CN112134885A (en) * 2020-09-23 2020-12-25 国网江苏省电力有限公司泰州供电分公司 Method and system for encrypting access of internet terminal
CN112637378B (en) * 2020-12-23 2023-02-03 携程旅游信息技术(上海)有限公司 User-based network address association method, system, device and storage medium
CN114344915A (en) * 2021-12-29 2022-04-15 深圳方舟互动科技有限公司 Online game interaction method based on AI intelligent identification

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020046188A1 (en) * 2000-06-12 2002-04-18 Burges Ronald Llewellyn Electronic deposit box system
CN1595948A (en) * 2003-09-10 2005-03-16 华为技术有限公司 A method for acquiring one-off secret code via handset

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6851060B1 (en) * 1999-07-15 2005-02-01 International Business Machines Corporation User control of web browser user data
CN1232067C (en) * 2001-01-03 2005-12-14 周学军 Data encryption transmission and exchange method in self-cycle balance state and soft-closed management system
FR2825209A1 (en) * 2001-05-23 2002-11-29 Thomson Licensing Sa DEVICES AND METHOD FOR SECURING AND IDENTIFYING MESSAGES
CN1310464C (en) * 2002-09-24 2007-04-11 黎明网络有限公司 Method for safe data transmission based on public cipher key architecture and apparatus thereof
CN100492968C (en) * 2004-11-26 2009-05-27 王小矿 Anti-fake technology based on dynamic cipher

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020046188A1 (en) * 2000-06-12 2002-04-18 Burges Ronald Llewellyn Electronic deposit box system
CN1595948A (en) * 2003-09-10 2005-03-16 华为技术有限公司 A method for acquiring one-off secret code via handset

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110535850A (en) * 2019-08-26 2019-12-03 腾讯科技(武汉)有限公司 Treating method and apparatus, storage medium and the electronic device that account number logs in
CN110535850B (en) * 2019-08-26 2022-07-29 腾讯科技(武汉)有限公司 Processing method and device for account login, storage medium and electronic device
CN111711628A (en) * 2020-06-16 2020-09-25 北京字节跳动网络技术有限公司 Network communication identity authentication method, device, system, equipment and storage medium
CN111711628B (en) * 2020-06-16 2022-10-21 北京字节跳动网络技术有限公司 Network communication identity authentication method, device, system, equipment and storage medium

Also Published As

Publication number Publication date
CN1808975B (en) 2010-09-08
CN1808975A (en) 2006-07-26

Similar Documents

Publication Publication Date Title
US8930700B2 (en) Remote device secure data file storage system and method
US6230272B1 (en) System and method for protecting a multipurpose data string used for both decrypting data and for authenticating a user
EP1349034B1 (en) Service providing system in which services are provided from service provider apparatus to service user apparatus via network
US7155616B1 (en) Computer network comprising network authentication facilities implemented in a disk drive
US6983381B2 (en) Methods for pre-authentication of users using one-time passwords
US9160732B2 (en) System and methods for online authentication
US11501294B2 (en) Method and device for providing and obtaining graphic code information, and terminal
JP4617763B2 (en) Device authentication system, device authentication server, terminal device, device authentication method, and device authentication program
US7181762B2 (en) Apparatus for pre-authentication of users using one-time passwords
US6044154A (en) Remote generated, device identifier key for use with a dual-key reflexive encryption security system
US8209753B2 (en) Universal secure messaging for remote security tokens
CN109076090B (en) Updating biometric data templates
US20050044367A1 (en) Enabling and disabling software features
US20100191967A1 (en) Client apparatus, server apparatus, and program
CN109410406A (en) A kind of authorization method, device and system
RU2584500C2 (en) Cryptographic authentication and identification method with real-time encryption
US9443068B2 (en) System and method for preventing unauthorized access to information
WO2007087748A1 (en) A theft protection system for network account and a method thereof
WO2007132946A1 (en) Authentication device using intrinsic random number generating element or pseudo-random number generating element, authentication apparatus, and authentication method
US8397281B2 (en) Service assisted secret provisioning
EP3513539B1 (en) User sign-in and authentication without passwords
CN102025748B (en) Method, device and system for acquiring user name of Kerberos authentication mode
WO2017050152A1 (en) Password security system adopted by mobile apparatus and secure password entering method thereof
JP2006522507A (en) Secure communication system and secure communication method
JP2004528624A (en) A device for pre-authenticating a user using a one-time password

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application
NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 07710844

Country of ref document: EP

Kind code of ref document: A1