Detailed explanation of the 5 basic methods

      In principle, methods 1 to 4 of the five basic methods use other parameters as the basis for judging whether the "username + password" received by the server is sent by the owner of the username.

      These parameters all have the following characteristics: 1) They are naturally present and unique in the network world, and do not require special expenditure for effective maintenance. 2) These parameters are either directly related to the person or directly related to the device. 3) The use of these parameters is inexpensive and simple. To falsify these parameters, regardless of the cost, has a great risk.

      These parameters are described in further detail below.

     Time: Everyone knows this. Everyone has to sleep. The person who logged in at bedtime was definitely not himself.

      Geolocation: A smartphone can provide very precise geographic location information. For user name thieves, if they rashly use "user name + password" for exploratory login, at least 99.99% of the probability will be exposed.

      Special ID: If you want to surf the Internet, you cannot do without an Internet device. In the Internet devices, those IDs that can be read, cannot be changed, and are globally unique can be used as special IDs. Such as the MAC code on the network card in the mobile phone or computer, the IMEI number of the mobile phone, the ICCID number on the SIM card, etc. For smart phones, the base station "ID" that the phone can "see" can be used as a special ID.

       Routing fingerprint: The so-called routing fingerprint refers to the data string formed by the mac codes of all routers between the user's Internet terminal and the server. Every router has a globally unique mac code. Under the circumstance that the fixed network application has been fully real-name system, the routing fingerprint can clearly point to a real-name natural or legal person and the installation address.

       A conceptual illustration of routing fingerprints can be found in Annex 1

       Method 5 is to push forward to the client the judgment of whether it is the user name + password and whether the program of the client should run normally.

 

attachment1:

          Routing Fingerprint Concept Note

         Figure 1: It is a schematic diagram of the router link between the user's computer and the network application server.

        When a surfer sends any information (such as "I am Zhang San") to the "Network Application Server" through the "User Computer", the "Network Application Server" will not only receive "I am Zhang San", but also receive corresponding routing fingerprint. "I'm Zhang San" is tightly attached to this route's fingerprints.

       Table 1 shows the possible routing fingerprints of the network application server in the case of Figure 1.

       In Table 1, "Mac-r/Mac-c1" or "Mac-r/Mac-c2" exactly refers to the only one network applicant, that is, the applicant who obtained the Internet light cat when applying for the network. If the applicant is an individual, it refers to an individual, and if the applicant is a legal person, it refers to a legal person.

       In Table 1, "Mac-y/Mac-r/Mac-c1" or "Mac-y/Mac-r/Mac-c2" refers to the only computer connected to the Internet.

       In reality, an operator's actual network is far more complex than the network in Figure 1. The network on the user side is also more complicated than that in FIG. 1 , especially if the applicant is a legal person, the network on the user side will be more complicated. But no matter how complicated it is, as long as you aim at "Mac-r" and "Mac-c", you will aim at the network applicant, and then aim at "Mac-y", "Mac-r", and "Mac-c". Aimed at Internet-connected computers related to online applicants.

        Now the real-name system has been fully implemented for online applications. Using routing fingerprints for identity identification can limit the people who need to be identified to a small range and an accurate geographic location.



Figure 1: Schematic diagram of the routing link from the user's computer to the network application server


routing fingerprint number

route fingerprint content

routing fingerprint 1

Mac-y/Mac-r/Mac-z1/Mac-c1/Mac-g

routing fingerprint 2

Mac-y/Mac-r/Mac-z1/Mac-c2/Mac-g

Routing Fingerprint 3

Mac-y/Mac-r/Mac-z2/Mac-c1/Mac-g

Routing Fingerprint 4

Mac-y/Mac-r/Mac-z2/Mac-c2/Mac-g

Table 1: Possible routing fingerprints in the case of Figure 1


Guess you like

Origin http://43.154.161.224:23101/article/api/json?id=325949328&siteId=291194637