Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for information security device for binding network software

A technology of information security and network software, applied in the field of information technology security, can solve the problems of legal online game player loss, insecure identity authentication methods, and easy identity counterfeiting, so as to avoid account theft, improve security, and effectively manage Effect

Active Publication Date: 2012-06-27
FEITIAN TECHNOLOGIES
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] Usually, when using network software, users need to implement identity authentication through username / password, because this kind of "username / password" identity authentication method uses a single-factor authentication method (only one condition is met to prove one The identity of a person is called single-factor authentication), and only one condition is used to judge that the user's identity is easy to be counterfeited, so the simple username / password method is an extremely insecure identity authentication method
For example, some malicious actors often use Trojan horses and hacking programs to steal identity information such as account numbers and passwords of legal online game players, and then illegally use this information to participate in online games, or resell it to others, and make ill-gotten gains from it. , causing great losses to legal online game players

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for information security device for binding network software
  • Method for information security device for binding network software
  • Method for information security device for binding network software

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0031] Such as figure 1 As shown, a method for bundling network software with an information security device includes the following steps.

[0032] Step 101: The operator obtains information security equipment from the manufacturer.

[0033] Operators can purchase information security equipment in bulk from hardware manufacturers.

[0034] Step 102: The operator generates a user account and a corresponding key, and writes it into a database.

[0035] The operator generates the user's account and the corresponding key, and writes it into the database on the server side to complete the binding of the account and key with the software.

[0036] Step 103: The operator writes specific information in the information security device.

[0037] After obtaining the information security device, the operator writes network software feature information and / or operator feature information into it.

[0038] Step 104: The operator writes the account number and the corresponding key into t...

Embodiment 2

[0049] Such as figure 2As shown, a method for bundling network software with an information security device includes the following steps.

[0050] Step 201: the agent obtains information security equipment from the manufacturer.

[0051] Agents can purchase information security equipment in bulk from hardware manufacturers and pay corresponding fees.

[0052] Step 202: The agent writes specific information in the information security device.

[0053] The agent writes the characteristic information of the network software in the information security device, and may also write the characteristic information of the agent.

[0054] Step 203: Generation of user accounts and corresponding keys.

[0055] The user's account number and the key corresponding to it can be generated at the agency.

[0056] Step 204: Write the account number and the corresponding key into the information security device.

[0057] The agent writes the generated user account and the corresponding key i...

Embodiment 3

[0069] Such as image 3 As shown, a method for bundling network software with an information security device includes the following steps.

[0070] Step 301: A user obtains an information security device from a manufacturer.

[0071] Users directly purchase information security equipment from hardware manufacturers and pay corresponding fees.

[0072] Step 302: the user acquires and installs the software client.

[0073] Users can obtain the software client program by purchasing an installation CD or downloading it from the Internet, and then install it on their own computers according to the relevant prompts.

[0074] Step 303: the client writes specific information in the information security device.

[0075] Write the network software feature information in the information security device through the software client.

[0076] Step 304: Generate a user account and a corresponding key, and complete the binding.

[0077] The client program accesses the information securit...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the field of information technology safety, and in particular provides a method for an information security device for binding network software. The method comprises the following steps that: a service end generates corresponding accounts and keys according to a hardware identification number of the information security device, writes the hardware identification number, the corresponding accounts and keys into a network software database, and writes the accounts and keys into the information security device; specific information is written into the information securitydevice, and the specific information is network software characteristic information and / or service end characteristic information; and a user acquires the information security device with the accounts, the keys and the specific information, installs the software, uses the software by using the specific information in the information security device, and uses the accounts and the keys in the information security device to carry out authentication. The binding method greatly improves the safety of the information security device.

Description

technical field [0001] The invention relates to the field of information technology security, and provides a method for improving the security of network software, specifically a method for bundling information security equipment of network software. Background technique [0002] Information security equipment is a small hardware device with a processor and a memory, which can be connected to a computer through the computer's data communication interface. It has the function of key generation, and can safely store the key, and can preset the function of encryption algorithm. The calculations related to the information security equipment and the key are completely run inside the device, and the information security equipment has the characteristics of anti-attack, and the security is extremely high. Information security equipment is generally connected to a computer through a USB interface, which is usually called a USB KEY or USBToken. [0003] The advancement of network t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32
Inventor 陆舟于华章
Owner FEITIAN TECHNOLOGIES
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products