Link login method and system

An algorithm and symmetric encryption algorithm technology, applied in the computer field, can solve the problem of high risk of obtaining keys, and achieve the effect of ensuring security

Inactive Publication Date: 2015-07-29
深圳墨麟科技股份有限公司
View PDF2 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] Players may tamper with the subsequent network communication packets. If the key of the encrypted message is stored in the mobile game client in advance, the risk of obtaining the key through cracking and other means is very high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Link login method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] Such as figure 1 As shown, the present invention discloses a login link method, in which the following preparatory work needs to be done:

[0049] Choose a secure asymmetric encryption algorithm (such as RSA), the following is regarded as using RSA;

[0050] Choose a secure symmetric encryption algorithm (such as AES), the following is regarded as using AES;

[0051] The developer generates a pair of RSA public key and private key. The public key is stored in the mobile game client (hereinafter referred to as the client) and is open to everyone. The private key is stored in the game server (hereinafter referred to as the server), and no third party can obtain it.

[0052] In the login link method of the present invention, the following steps are performed in the server:

[0053]In the receiving step, the server receives the encrypted login message login_message sent by the client;

[0054] In the decryption step, after the server receives the login message login_mess...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a link login method and system. The link login method comprises the steps of: a receiving step, including that a server receives an encrypted login message sent by a client; a decryption step, including that after the server receives the login message, a private key of an asymmetric cryptographic algorithm is used for decrypting; in the link login method, all communications of the client and the server are encrypted by a symmetric cryptographic algorithm using a random character string key as a secret key. The link login method and system have the advantages that, the secret keys are safely exchanged in an unsafe channel, so that a user can log in safely and reconnect after disconnection, all later communication contents cannot be monitored and sniffed by the network, a player is prevented from tampering and resending network packets, and the safety of the user is ensured.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to a login link method and system. Background technique [0002] Mobile game developers need to implement the user login verification function according to the login specifications of each mobile game platform. The general steps are as follows: [0003] 1. In order to prevent the developer from obtaining the user's user name and password and other security issues, the platform will first let the user enter the user name and password on the page provided by the platform to log in, and use necessary ssl encryption and other means to ensure safe transmission and prevent intermediary monitoring, etc. , the user will get a token, such as 11814024959cb47eef1734b15bc94c79984493a922b7c5c088, and some platforms will also include the user's id. [0004] 2. The user initiates a connection to the game server, sends a token (some platforms also include a user id), and the server calls the pla...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0435H04L63/30
Inventor 陈天敏
Owner 深圳墨麟科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products