Processing method for preventing copy attack, and server and client
First Claim
1. A computer-implemented method, comprising:
- receiving, by a server and from a client computing device, service data, wherein the service data comprises a first unique identifier and a first variable identifier stored in a local secure storage of the client computing device;
parsing, by the server, the service data to obtain the first unique identifier and the first variable identifier as parsed data;
determining, by the server, whether the first unique identifier and the first variable identifier in the parsed data are respectively identical to a second unique identifier and a second variable identifier associated with the client computing device and recorded by the server as recorded data, wherein the second unique identifier is generated by the server and uniquely identifies the client computing device, wherein the second variable identifier is a random number updated by the server each time the client computing device is triggered to use a service related to the local secure storage; and
in response to determining that either of the first unique identifier and the first variable identifier in the parsed data is not identical to the second unique identifier and the second variable identifier, respectively;
indicating, by the server, that the local secure storage of the client computing device is under a copy attack, andperforming a predetermined response action;
orin response to determining that the first unique identifier and the first variable identifier in the parsed data are identical to the second unique identifier and the second variable identifier, respectively;
transmitting, by the server and to the client computing device, a new variable identifier to replace the first variable identifier, wherein the new variable identifier is included within next service data received from the client computing device.
3 Assignments
0 Petitions
Accused Products
Abstract
Service data is received by a server and from a client computing device, where the service data includes a unique identifier and a variable identifier stored in a local secure storage of the client computing device. The server parses the service data to obtain the unique identifier and the variable identifier as parsed data. The server determines whether the unique identifier and the variable identifier in the parsed data are identical to a unique identifier and a variable identifier associated with the client computing device and recorded by the server as recorded data. If the result of the determination is not identical, the server indicates that the local secure storage of the client computing device is under a copy attack, and performing a predetermined response action. If the result of the determination is identical, the server transmits a new variable identifier to the client computing device.
5 Citations
20 Claims
-
1. A computer-implemented method, comprising:
-
receiving, by a server and from a client computing device, service data, wherein the service data comprises a first unique identifier and a first variable identifier stored in a local secure storage of the client computing device; parsing, by the server, the service data to obtain the first unique identifier and the first variable identifier as parsed data; determining, by the server, whether the first unique identifier and the first variable identifier in the parsed data are respectively identical to a second unique identifier and a second variable identifier associated with the client computing device and recorded by the server as recorded data, wherein the second unique identifier is generated by the server and uniquely identifies the client computing device, wherein the second variable identifier is a random number updated by the server each time the client computing device is triggered to use a service related to the local secure storage; and in response to determining that either of the first unique identifier and the first variable identifier in the parsed data is not identical to the second unique identifier and the second variable identifier, respectively; indicating, by the server, that the local secure storage of the client computing device is under a copy attack, and performing a predetermined response action;
orin response to determining that the first unique identifier and the first variable identifier in the parsed data are identical to the second unique identifier and the second variable identifier, respectively; transmitting, by the server and to the client computing device, a new variable identifier to replace the first variable identifier, wherein the new variable identifier is included within next service data received from the client computing device. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A non-transitory, computer-readable medium storing one or more instructions executable by a computer system to perform operations comprising:
-
receiving, by a server and from a client computing device, service data, wherein the service data comprises a first unique identifier and a first variable identifier stored in a local secure storage of the client computing device; parsing, by the server, the service data to obtain the first unique identifier and the first variable identifier as parsed data; determining, by the server, whether the first unique identifier and the first variable identifier in the parsed data are respectively identical to a second unique identifier and a second variable identifier associated with the client computing device and recorded by the server as recorded data, wherein the second unique identifier is generated by the server and uniquely identifies the client computing device, wherein the second variable identifier is a random number updated by the server each time the client computing device is triggered to use a service related to the local secure storage; and in response to determining that either of the first unique identifier and the first variable identifier in the parsed data is not identical to the second unique identifier and the second variable identifier, respectively; indicating, by the server, that the local secure storage of the client computing device is under a copy attack, and performing a predetermined response action;
orin response to determining that the first unique identifier and the first variable identifier in the parsed data are identical to the second unique identifier and the second variable identifier, respectively; transmitting, by the server and to the client computing device, a new variable identifier to replace the first variable identifier, wherein the new variable identifier is included within next service data received from the client computing device. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A computer-implemented system, comprising:
-
one or more computers; and one or more computer memory devices interoperably coupled with the one or more computers and having tangible, non-transitory, machine-readable media storing one or more instructions that, when executed by the one or more computers, perform one or more operations comprising; receiving, by a server and from a client computing device, service data, wherein the service data comprises a first unique identifier and a first variable identifier stored in a local secure storage of the client computing device; parsing, by the server, the service data to obtain the first unique identifier and the first variable identifier as parsed data; determining, by the server, whether the first unique identifier and the first variable identifier in the parsed data are respectively identical to a second unique identifier and a second variable identifier associated with the client computing device and recorded by the server as recorded data, wherein the second unique identifier is generated by the server and uniquely identifies the client computing device, wherein the second variable identifier is a random number updated by the server each time the client computing device is triggered to use a service related to the local secure storage; and in response to determining that either of the first unique identifier and the first variable identifier in the parsed data is not identical to the second unique identifier and the second variable identifier, respectively; indicating, by the server, that the local secure storage of the client computing device is under a copy attack, and performing a predetermined response action;
orin response to determining that the first unique identifier and the first variable identifier in the parsed data are identical to the second unique identifier and the second variable identifier, respectively; transmitting, by the server and to the client computing device, a new variable identifier to replace the first variable identifier, wherein the new variable identifier is included within next service data received from the client computing device. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification