TW201826161A - Method to apply Token to hiding the network service to convert the user ID and the service code into a Token for hiding and protecting the user identity and the user's behavior conducted beforehand - Google Patents
Method to apply Token to hiding the network service to convert the user ID and the service code into a Token for hiding and protecting the user identity and the user's behavior conducted beforehand Download PDFInfo
- Publication number
- TW201826161A TW201826161A TW106100088A TW106100088A TW201826161A TW 201826161 A TW201826161 A TW 201826161A TW 106100088 A TW106100088 A TW 106100088A TW 106100088 A TW106100088 A TW 106100088A TW 201826161 A TW201826161 A TW 201826161A
- Authority
- TW
- Taiwan
- Prior art keywords
- token
- service
- code
- server
- item
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 62
- 238000012545 processing Methods 0.000 claims abstract description 4
- 238000012795 verification Methods 0.000 claims description 14
- 238000006243 chemical reaction Methods 0.000 claims description 2
- 230000005540 biological transmission Effects 0.000 abstract description 6
- 238000010586 diagram Methods 0.000 description 5
- 230000000694 effects Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000000750 progressive effect Effects 0.000 description 1
- 235000015096 spirit Nutrition 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Landscapes
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
本發明係關於一種應用符記於隱藏網路服務之方法,特別係指一種將使用者識別碼與欲進行之行為轉換成一符記,以提高資料傳遞的安全性。The present invention relates to a method for applying tokens to hidden network services, and particularly to a method for converting a user identification code and a desired behavior into a token to improve the security of data transmission.
近年來隨著網路的普及,越來越多商家藉由網路提供各種服務,然而隨著網路的掀起,有些不法人士就將犯罪行為移至網路上進行,鑽研網路的漏洞,投機取巧從中牟利,因而網路安全也越來越受到大眾的關注。In recent years, with the popularity of the Internet, more and more businesses provide various services through the Internet. However, with the rise of the Internet, some criminals have moved their criminal acts to the Internet, deliberating on network vulnerabilities, and opportunistic. Profit from it, so network security is getting more and more attention.
過去有人提出將資料加密的方式以達到保護的目的,其加密方法有對稱式加密和非對稱式加密,然加密方法與金鑰若被破解,則資料內容仍會被得知進而做些損害使用者權益之行為,故有人提出加入隨機碼機制,用以混淆犯罪者,使其不易辨別資料內容,還有人提出加入檢查碼機制,以確保資料內容並無被修改。In the past, some people proposed the method of encrypting data to achieve protection. The encryption methods include symmetric encryption and asymmetric encryption. However, if the encryption method and key are cracked, the data content will still be known and used for damage. Therefore, some people have proposed adding a random code mechanism to confuse offenders to make it difficult to discern the content of the data. Others have proposed to add a check code mechanism to ensure that the content of the data has not been modified.
雖然上述之方法皆能提高網路安全性,但是網路服務的運作方法基本是固定的,也就是告知使用者有哪些服務,透過網址附加一些參數,將資料傳回至伺服器,或是透過選擇的方式將後續的執行動作寫入於其選擇的項目內,而這之間不管是服務的內容或是使用者輸入的資料,其傳遞會用明碼的方式傳遞。如在傳遞的過程中不希望被人隨意查看,就需要對資料進行加密,若所有人的加密都使用同一把金鑰,則安全性會很低,若要針對不同使用者採用不同金鑰,則不管哪種加密方式,進行加密前皆需要知道使用者的身分才能取出對應之金鑰,如此在加密前,就必須先知道使用者的身分,才能取得相對應之金鑰,在不確定使用者身分的情況下,是無法順利進行加解密的。Although the above methods can improve network security, the operation method of network services is basically fixed, that is, to tell users what services are available, append some parameters through the URL, and send data back to the server, or The selected method writes the subsequent execution actions in the selected item, and whether it is the content of the service or the data entered by the user, the delivery will be passed in a clear code. If you do not want to be viewed at will during the transmission process, you need to encrypt the data. If everyone uses the same key for encryption, the security will be very low. To use different keys for different users, Regardless of the encryption method, you need to know the identity of the user before you can encrypt the corresponding key. Therefore, you must know the identity of the user before you can obtain the corresponding key. In the case of the identity of the person, encryption and decryption cannot be performed smoothly.
即便將資料加密,使用者所選擇的服務也是以明碼方式呈現,而這就給了犯罪者可趁之機,犯罪者可以專注於某些提供特定網路服務之伺服器(例如:銀行的網站、購物平台等)進行攻擊,由於已知服務內容,故可得知其服務內容執行時所必要之資料,因此即便資料被加密,也可以不斷嘗試各種攻擊方式破解其內容,從而竊取、竄改或仿冒等犯罪行為,故除了保護資料外,也應保護目前進行之網路服務,以防止有心人士針對特定的網路服務進行攻擊,因此,提出一個保護資料和網路服務內容的方法是很有必要的。Even if the data is encrypted, the service selected by the user is presented in clear code, which gives the criminal a chance to focus on some servers that provide specific Internet services (such as the website of a bank) , Shopping platforms, etc.), because the known service content, you can know the information necessary for the execution of its service content, so even if the data is encrypted, you can continue to try various attack methods to crack its content, thereby stealing, tampering or Criminal acts such as counterfeiting, so in addition to protecting data, we should also protect the current network services to prevent people from attacking specific network services. Therefore, it is very important to propose a method to protect data and network service content. necessary.
本發明之主要目的,係提供一種應用符記於隱藏網路服務之方法,其可隱藏目前執行之網路服務。The main object of the present invention is to provide a method for hiding a network service by applying tokens, which can hide a currently running network service.
本發明之次要目的,係提供一種應用符記於隱藏網路服務之方法,其透過一代碼混淆演算法將一客戶端識別碼及一服務代碼轉換成無法直接理解之符記,故無法從符記中得到目前的網路服務為何。A secondary object of the present invention is to provide a method for applying tokens to hidden network services, which uses a code obfuscation algorithm to convert a client identification code and a service code into tokens that cannot be directly understood. Get the current internet service in the token.
本發明之又一目的,係提供一種應用符記於隱藏網路服務之方法,其符記中包含一客戶端識別碼,故除非遺失符記,否則客戶端只需進行一次登入後就無須再提供帳號及密碼,降低帳號及密碼被第三者得知的機率。Yet another object of the present invention is to provide a method for applying tokens to hidden network services. The token includes a client identification code, so unless the token is lost, the client only needs to log in once and no longer need to log in. Provide account number and password to reduce the chance that the account number and password will be known by a third party.
為了達到上述之目的,本發明之一實施例係揭示一種應用符記於隱藏網路服務之方法,其步驟包含:一客戶端使用一電子裝置登入至一伺服器,該伺服器依該客戶端取得對應之權限產生一符記,該符記包含該客戶端之一客戶端識別碼及對應一服務項目之一服務代碼,該伺服器將該客戶端對應之權限之該服務項目及該符記傳送至該電子裝置,該電子裝置選擇該服務項目,該電子裝置將對應該服務項目之該符記傳送至該伺服器,該伺服器依據該符記之該服務代碼及該客戶端識別碼進行相應之處理。In order to achieve the above-mentioned object, an embodiment of the present invention discloses a method for applying a token to a hidden network service. The steps include: a client uses an electronic device to log in to a server, and the server according to the client Obtaining the corresponding authority generates a token, the token contains a client identifier of the client and a service code corresponding to a service item, and the server assigns the service item of the authority corresponding to the client and the token Transmitting to the electronic device, the electronic device selecting the service item, the electronic device transmitting the token corresponding to the service item to the server, and the server performing the service code and the client identification code according to the token Handle accordingly.
於本發明之一實施例中,其中於一客戶端使用一電子裝置登入至一伺服器時,包含下列步驟:該伺服器發送一初始符記至該電子裝置,該初始符記包含對應於該服務項目之一登入服務之該服務代碼,該客戶端於該電子裝置輸入一帳號及一密碼並將該帳號、該密碼及該初始符記傳送至該伺服器,該伺服器將該帳號及該密碼與一客戶資料庫進行身分驗證,當驗證通過後,該伺服器依據該帳號取得對應之權限產生該符記。In an embodiment of the present invention, when a client uses an electronic device to log in to a server, the method includes the following steps: the server sends an initial token to the electronic device, and the initial token includes a message corresponding to the One of the service items logs in the service code of the service, the client enters an account number and a password on the electronic device and transmits the account number, the password, and the initial token to the server, and the server transmits the account number and the The password performs identity verification with a customer database. After the verification is passed, the server generates the token based on the account to obtain corresponding permissions.
於本發明之一實施例中,其中該符記產生方式係以一代碼混淆演算法進行字元轉換或位置交換。In one embodiment of the present invention, the token generation method uses a code obfuscation algorithm to perform character conversion or position exchange.
於本發明之一實施例中,其中於該電子裝置將對應該服務項目之該符記傳送至該伺服器後,包含下列步驟:該符記用該代碼混淆演算法進行逆程序處理後從該符記中取得該客戶端識別碼及該服務代碼。In an embodiment of the present invention, after the electronic device transmits the token corresponding to the service item to the server, the method includes the following steps: the token uses the code to obfuscate the algorithm to perform inverse program processing from the token; The client identification code and the service code are obtained in the token.
於本發明之一實施例中,其中於該伺服器將該客戶端對應之權限之至少一服務項目及該符記傳送至該電子裝置之步驟中,該符記記載於一網址或一網頁。In an embodiment of the present invention, in the step of the server transmitting at least one service item corresponding to the authority of the client and the token to the electronic device, the token is recorded on a website or a web page.
於本發明之一實施例中,其中於該電子裝置將對應該服務項目之該符記傳送至該伺服器步驟前,其進一步包含該客戶端於該電子裝置對應該服務項目之一輸入資訊。In one embodiment of the present invention, before the electronic device transmits the token corresponding to the service item to the server, it further includes the client inputting information on one of the electronic device corresponding service items.
於本發明之一實施例中,其中該符記更包含一隨機碼及一檢查碼。In one embodiment of the present invention, the token further includes a random code and a check code.
於本發明之一實施例中,其中該隨機碼係用一隨機演算法產生。In one embodiment of the present invention, the random code is generated using a random algorithm.
於本發明之一實施例中,其中該檢查碼係用該隨機碼、該客戶端識別碼及該服務代碼進行一位元運算產生。In one embodiment of the present invention, the check code is generated by performing a one-bit operation using the random code, the client identification code, and the service code.
於本發明之一實施例中,其中於該電子裝置將對應該服務項目之該符記傳送至該伺服器之步驟後,其進一步包含下列步驟:該伺服器將該符記之該客戶端識別碼、該服務代碼及該隨機碼進行該位元運算產生一驗證檢查碼,然後比對該符記之該檢查碼與該驗證檢查碼是否一致。In an embodiment of the present invention, after the electronic device transmits the token corresponding to the service item to the server, it further includes the following steps: the server identifies the token to the client Code, the service code, and the random code to perform the bit operation to generate a verification check code, and then compare whether the check code of the mark is consistent with the verification check code.
為使 貴審查委員對本發明之特徵及所達成之功效有更進一步之瞭解與認識,謹佐以較佳之實施例及配合詳細之說明,說明如後:In order to make the reviewing committee members have a better understanding and understanding of the features of the present invention and the effects achieved, we would like to provide a better embodiment and a detailed description with the following description:
本實施案例提供一種應用符記於隱藏網路服務之方法,先前技術往往將目前進行之網路服務以明碼方式於網路中傳遞,因而有心人士可以針對特定之網路服務嘗試取得其內容,因此本發明提出一種將客戶端識別碼及服務項目之代碼進行混淆產生一符記,以防止有心人士竊取資料。藉由符記將客戶端識別碼與服務代碼隱藏並進行傳遞,並且符記可於客戶端保存,因此除非符記遺失,執行過一次登入驗證後,之後就無須再進行登入動作,可降低帳號及密碼被竊取的機率。This implementation case provides a method of applying tokens to hidden network services. The previous technology often transmitted the currently performed network services over the network in a clear manner, so interested people can try to obtain their content for specific network services. Therefore, the present invention proposes to obfuscate the client identification code and the code of the service item to generate a token to prevent people from stealing information. The client ID and service code are hidden and transmitted by tokens, and tokens can be saved on the client. Therefore, unless the tokens are lost, after performing a login verification, there is no need to perform a login action afterwards, which can reduce the account number. And the chance of a password being stolen.
在此說明本發明之第一實施例之應用符記於隱藏網路服務之方法之流程,請參閱第一圖,其係為本發明之第一實施例之應用符記於隱藏網路服務之方法之流程圖。如圖所示,本實施例之應用符記於隱藏網路服務之方法其步驟包含:The following describes the flow of the method of using the first embodiment of the present invention to hide the network service. Please refer to the first figure, which is the application of the first embodiment of the present invention to hide the network service. Method flow chart. As shown in the figure, the steps of the method for hiding the network service in the application of this embodiment include:
步驟S1:登入連線至一伺服器;Step S1: login and connect to a server;
步驟S3:伺服器產生符記;Step S3: the server generates a token;
步驟S5:傳送服務項目與符記;Step S5: transmitting service items and tokens;
步驟S7:選擇服務項目;Step S7: Select a service item;
步驟S9:傳送對應服務項目之符記;以及Step S9: transmitting a token corresponding to the service item; and
步驟S11:依據符記進行相應之處理。Step S11: Perform corresponding processing according to the token.
接著說明為達成本發明之應用符記於隱藏網路服務之方法所需之系統,請參閱第二圖,其係本發明之第一實施例之應用符記於隱藏網路服務之方法之系統示意圖。如圖所示,本發明之應用符記於隱藏網路服務之方法之系統包含:一電子裝置10、一伺服器30及一客戶資料庫301。Next, the system required for the method of hiding the network service in order to achieve the application of the invention is described. Please refer to the second figure, which is the system of the method for hiding the network service in the first embodiment of the present invention. schematic diagram. As shown in the figure, the system of the present invention applying the method for hiding network services includes: an electronic device 10, a server 30, and a customer database 301.
上述之一電子裝置10為桌上型電腦、筆記型電腦、智慧型手機、個人數位助理或功能型手機等各種能與網路連線之裝置。One of the above-mentioned electronic devices 10 is various devices that can be connected to a network, such as a desktop computer, a notebook computer, a smart phone, a personal digital assistant, or a feature phone.
上述之一客戶資料庫301可位於該伺服器30內或是位於一外部伺服器,此僅一較佳之實施例,然設置方式並不限於此。One of the above-mentioned customer database 301 may be located in the server 30 or an external server. This is only a preferred embodiment, but the setting method is not limited to this.
以下將說明本發明之第一實施例之應用符記於隱藏網路服務之方法之流程,請參閱搭配第一圖及第二圖。當一電子裝置10透過網路連線至一伺服器30時,將執行步驟S1至S11。The following describes the flow of the method for applying the first embodiment of the present invention to hide the network service. Please refer to the first figure and the second figure. When an electronic device 10 is connected to a server 30 through a network, steps S1 to S11 are performed.
於步驟S1中,當一電子裝置10連線至一伺服器30之登入頁面時,登入頁面包含一初始符記傳送至電子裝置10,客戶端於登入頁面輸入帳號及密碼後,帳號、密碼以及初始符記會傳送至伺服器30。In step S1, when an electronic device 10 is connected to a login page of a server 30, the login page includes an initial token transmitted to the electronic device 10. After the client enters the account and password on the login page, the account, password, and The initial token is transmitted to the server 30.
於本發明之一實施例中,於步驟S1,該初始符記包含一代表登入服務之服務代碼。In one embodiment of the present invention, in step S1, the initial token includes a service code representing a login service.
於步驟S3中,伺服器30從初始符記中取得一服務代碼,得知目前預執行服務為登入服務,伺服器30會依據帳號、密碼與客戶資料庫301進行身分驗證,當通過身分驗證後,會依據帳號對應權限之可行使之服務產生相對應數量之符記。In step S3, the server 30 obtains a service code from the initial token, and learns that the currently pre-executed service is a login service. The server 30 performs identity verification based on the account number, password, and customer database 301. After passing the identity verification , A corresponding number of tokens will be generated according to the exercisable services corresponding to the account's permissions.
於本發明之一實施例中,於步驟S3,該符記包含客戶端識別碼及對應服務項目之服務代碼,且用一代碼混淆演算法產生。In one embodiment of the present invention, in step S3, the token includes a client identification code and a service code of a corresponding service item, and is generated by a code obfuscation algorithm.
於步驟S5中,伺服器30依帳號之權限將可行使之服務項目與符記傳送至電子裝置10。In step S5, the server 30 transmits the exercisable service items and tokens to the electronic device 10 according to the authority of the account.
於本發明之一實施例中,於步驟S5,該符記記載於一網址或一網頁中。In one embodiment of the present invention, in step S5, the token is recorded in a web address or a web page.
於步驟S7中,於電子裝置10選擇預做之服務項目。In step S7, a pre-made service item is selected in the electronic device 10.
於步驟S9中,電子裝置10傳送對應選擇服務項目之符記至伺服器30。In step S9, the electronic device 10 sends a token corresponding to the selected service item to the server 30.
於本發明之一實施例中,於步驟S9,伺服器30會將符記做代碼混淆演算法之逆程序處理,並從符記中取得客戶端識別碼及服務代碼。In one embodiment of the present invention, in step S9, the server 30 processes the token as a reverse process of the code obfuscation algorithm, and obtains the client identification code and service code from the token.
於步驟S11中,伺服器30依據符記中之服務代碼及客戶端識別碼進行相應之處理。In step S11, the server 30 performs corresponding processing according to the service code and the client identification code in the token.
於此,即完成本發明之第一實施例之應用符記於隱藏網路服務之方法,伺服器接收客戶端傳送之帳號及密碼並進行身分驗證後,可依據該帳號對應之權限之可行使之服務項目產生包含客戶端識別碼與服務代碼之符記,依據客戶端選擇之服務項目會回傳相應之符記至伺服器,故伺服器可從該符記中得知後續要執行之動作,由於客戶端識別碼與服務代碼皆隱藏於符記中,因此不易被有心人士依據服務項目猜測並破解其資料內容,提高資料於網路中傳遞之安全性。其可應用於帳戶登入後之查詢服務,但不限於此應用。Here, the method of hiding the network service in the application of the first embodiment of the present invention is completed. After the server receives the account and password sent by the client and performs identity verification, it can exercise according to the permissions corresponding to the account The service item generates a token containing the client identification code and the service code. According to the service item selected by the client, the corresponding token is returned to the server, so the server can learn the subsequent actions from the token. Because the client identification code and service code are hidden in the token, it is not easy for people with intentions to guess and crack their data content based on the service items, improving the security of data transmission on the network. It can be applied to the inquiry service after account login, but it is not limited to this application.
接著說明為達成本發明之第二實施例之應用符記於隱藏網路服務之方法,請參閱第二圖及第三圖,本實施例之流程與第一實施例之差異在於:本實施例之流程中,其步驟S3所產生之符記更包含一隨機碼與一檢查碼,隨機碼係用一隨機演算法產生,檢查碼係用隨機碼、客戶端識別碼及服務代碼用一位元運算產生,且本實施例包含一步驟S10。Next, the method of applying the second embodiment of the invention to hide the network service will be described. Please refer to the second and third diagrams. The difference between the process of this embodiment and the first embodiment lies in: In the process, the token generated in step S3 further includes a random code and a check code. The random code is generated by a random algorithm. The check code is a random code, a client identification code, and a service code. The operation is generated, and this embodiment includes a step S10.
於步驟S10中,檢查符記完整性,伺服器30接收傳送過來之符記且進行代碼混淆演算法之逆程序後,伺服器30從符記中取得客戶端識別碼、服務代碼及隨機碼進行位元運算產生一驗證檢查碼,隨後比對符記中之檢查碼與驗證檢查碼是否一致以確認完整性。In step S10, the integrity of the token is checked. After the server 30 receives the transmitted token and performs the inverse procedure of the code obfuscation algorithm, the server 30 obtains the client identification code, service code, and random code from the token. The bit operation generates a verification check code, and then checks whether the check code in the token is consistent with the verification check code to confirm the integrity.
藉由本實施例,符記增加之隨機碼每次產生皆不相同,故可保證符記之唯一性且無法預測符記內容,增加檢查碼則可以檢查符記傳遞過程中是否有被竄改,以確保資料完整性,故進一步提高資料傳遞的安全性。With this embodiment, the random code added to the token is generated differently each time, so the uniqueness of the token can be guaranteed and the content of the token cannot be predicted. The addition of a check code can check whether the token has been tampered with during the transmission of the token. To ensure the integrity of the data, the security of data transmission is further improved.
接著說明為達成本發明之第三實施例之應用符記於隱藏網路服務之方法,請參閱第二圖及第四圖,本實施例之流程與第一實施例之差異在於:本實施例之流程中,其步驟S71與步驟S91分別取代步驟S7與步驟S9。Next, the method of applying the third embodiment of the invention to the hidden network service will be described. Please refer to the second and fourth figures. The difference between the process of this embodiment and the first embodiment lies in: In the process, steps S71 and S91 replace steps S7 and S9, respectively.
於步驟S71中,選擇服務項目及輸入資訊,於電子裝置10選擇預做之服務項目後,依據所選之服務項目,需客戶端填選一輸入資訊,該輸入資訊係供伺服器30所執行該服務所需之資訊。In step S71, selecting a service item and inputting information. After the electronic device 10 selects a pre-made service item, the client needs to fill in an input information according to the selected service item. The input information is for the server 30 to execute Information required for the service.
於步驟S91中,傳送對應服務項目之符記及輸入資訊,電子裝置10傳送對應選擇服務項目之符記及客戶端填選之輸入資訊至伺服器30。In step S91, the token and input information corresponding to the service item are transmitted, and the electronic device 10 transmits the token corresponding to the selected service item and the input information selected by the client to the server 30.
藉由本實施例,藉由客戶端傳送額外之資訊至伺服器,可使伺服器依客戶端需求執行不同服務。其可應用於轉帳、電子支付等應用上,但不限於此應用。With this embodiment, the client sends additional information to the server, which enables the server to perform different services according to the client's needs. It can be applied to applications such as money transfer and electronic payment, but is not limited to this application.
接著說明為達成本發明之第四實施例之應用符記於隱藏網路服務之方法,請參閱第二圖及第五圖,本實施例之流程與第二實施例之差異在於:本實施例之流程中,其步驟S71與步驟S91分別取代步驟S7與步驟S9,步驟S71與步驟S91之流程第三實施例相同,故不再贅述。Next, the method of applying the fourth embodiment of the invention to hide the network service will be described. Please refer to the second and fifth figures. The difference between the process of this embodiment and the second embodiment lies in: In the flow, steps S71 and S91 replace steps S7 and S9, respectively. Step S71 is the same as the third embodiment of the flow of step S91, and will not be described again.
惟以上所述者,僅為本發明之較佳實施例而已,並非用來限定本發明實施之範圍,舉凡依本發明申請專利範圍所述之形狀、構造、特徵及精神所為之均等變化與修飾,均應包括於本發明之申請專利範圍內。However, the above are only preferred embodiments of the present invention, and are not intended to limit the scope of implementation of the present invention. For example, all changes and modifications of the shapes, structures, features, and spirits in accordance with the scope of the patent application for the present invention are made. Shall be included in the scope of patent application of the present invention.
本發明係實為依據有新穎性、進步性及可供產業利用者,應符合我國專利法所規定之專利申請要件無疑,爰依法提出發明專利申請,祈 鈞局早日賜准專利,至感為禱。This invention is based on those who are novel, progressive, and available for industrial use. It should meet the patent application requirements stipulated by the Chinese Patent Law. No doubt, the invention patent application was submitted in accordance with the law. prayer.
10‧‧‧電子裝置10‧‧‧ electronic device
30‧‧‧伺服器30‧‧‧Server
301‧‧‧客戶資料庫301‧‧‧Customer database
第一圖:其係本發明之一第一實施例之應用符記於隱藏網路服務之方法之流程圖; 第二圖:其係本發明之一第一實施例之應用符記於隱藏網路服務之方法之系統示意圖; 第三圖:其係本發明之一第二實施例之應用符記於隱藏網路服務之方法之流程圖; 第四圖:其係本發明之一第三實施例之應用符記於隱藏網路服務之方法之流程圖;以及 第五圖:其係本發明之一第四實施例之應用符記於隱藏網路服務之方法之流程圖。First diagram: It is a flow chart of a method of applying a token to a hidden network service according to a first embodiment of the present invention; Second diagram: It is an application token of a first embodiment of the present invention on a hidden network; Schematic diagram of the system of the road service method; Figure 3: It is a flowchart of the method for hiding the network service application according to a second embodiment of the present invention; Figure 4: It is a third implementation of the present invention The flow chart of the method for hiding the application of the example is shown in the flowchart; and the fifth drawing is a flow chart of the method for hiding the service of the application in the fourth embodiment of the present invention.
Claims (10)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| TW106100088A TWI615735B (en) | 2017-01-03 | 2017-01-03 | Application of the method of hiding network services |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| TW106100088A TWI615735B (en) | 2017-01-03 | 2017-01-03 | Application of the method of hiding network services |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| TWI615735B TWI615735B (en) | 2018-02-21 |
| TW201826161A true TW201826161A (en) | 2018-07-16 |
Family
ID=62014644
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| TW106100088A TWI615735B (en) | 2017-01-03 | 2017-01-03 | Application of the method of hiding network services |
Country Status (1)
| Country | Link |
|---|---|
| TW (1) | TWI615735B (en) |
Family Cites Families (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| TW200828939A (en) * | 2006-12-22 | 2008-07-01 | Ind Tech Res Inst | Security mechanism for one-time secured data access |
| JP2012224537A (en) * | 2011-04-07 | 2012-11-15 | Hitachi Metals Ltd | Sintered body for ptc element, method for producing the same, the ptc element, and heat generating module |
| US20120316992A1 (en) * | 2011-06-07 | 2012-12-13 | Oborne Timothy W | Payment privacy tokenization apparatuses, methods and systems |
| US9202086B1 (en) * | 2012-03-30 | 2015-12-01 | Protegrity Corporation | Tokenization in a centralized tokenization environment |
| US10878422B2 (en) * | 2013-06-17 | 2020-12-29 | Visa International Service Association | System and method using merchant token |
-
2017
- 2017-01-03 TW TW106100088A patent/TWI615735B/en active
Also Published As
| Publication number | Publication date |
|---|---|
| TWI615735B (en) | 2018-02-21 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US11803633B1 (en) | Method and system for securing user access, data at rest and sensitive transactions using biometrics for mobile devices with protected, local templates | |
| US8245030B2 (en) | Method for authenticating online transactions using a browser | |
| JP6702874B2 (en) | Method and apparatus for providing client-side score-based authentication | |
| CN112333198A (en) | Secure cross-domain login method, system and server | |
| KR101718948B1 (en) | Integrated certification system using one time random number | |
| US20070162961A1 (en) | Identification authentication methods and systems | |
| CN104468096B (en) | Based on key disperse computing realize network electronic identification information protection method | |
| TW200818838A (en) | Mutual authentication and secure channel establishment between two parties using consecutive one-time passwords | |
| CN107277059A (en) | A kind of one-time password identity identifying method and system based on Quick Response Code | |
| JP2018502410A (en) | Common identification data replacement system and method | |
| CN105282090A (en) | Public URL encryption coding method for preventing illegal access on internet | |
| Verma et al. | Optical image encryption system using nonlinear approach based on biometric authentication | |
| Naser et al. | QR code based two-factor authentication to verify paper-based documents | |
| Balayogi et al. | An approach for mitigating cognitive load in password management by integrating QR codes and steganography | |
| CN107291773B (en) | Webpage address generation method and device | |
| CN102833239B (en) | Method for implementing nesting protection of client account information based on network identity | |
| Park et al. | A study on secure authentication system using integrated user authentication service | |
| TWI615735B (en) | Application of the method of hiding network services | |
| CN110708155A (en) | Copyright information protection method, copyright information protection system, copyright confirming method, copyright confirming device, copyright confirming equipment and copyright confirming medium | |
| US10701105B2 (en) | Method for website authentication and for securing access to a website | |
| TWI640928B (en) | System for generating and decrypting two-dimensional codes and method thereof | |
| KR102673516B1 (en) | Payment authentication method through double encryption and payment server performing the same method | |
| TWM542905U (en) | System using token to hide network service | |
| Chhetri | Novel approach towards authentication using multi level password system | |
| Wei et al. | Enhancing the security of credit card transaction based on visual DSC |