Raysync Security Design: Account&Password Protection

自定义模板 (74)

Raysync is designed with multiple security protection based on the account number and password of the user. Specific security design is as follows:

Account protection security design

  • Login authentication has a built-in anti-violence cracking mechanism, if the user enters the wrong password five times within 3 minutes, the account will be automatically locked.

  • Session identification in login is generated by using the interface of OpenSSL high-strength random function RAND_bytes () to prevent random information from being hit by the simulator.

Password protection security design

  • In the transfer process, the user password is encrypted by the asymmetric high-strength encryption algorithm, and even if the transfer message is intercepted, the attacker can not recover the plaintext through ciphertext.

  • The information stored in the database of the user password is irreversibly encrypted 10,000 times in one direction by using the PBKDF2 algorithm and the user's individual random salt. Even if the database information is leaked, the user password cannot be reversed through ciphertext.

  • The password must be a combination of case, number and special symbols, and the length is greater than or equal to 8 characters.

  • The system provides a weak password dictionary. Users can customize weak passwords that meet the password strength but are easy to be cracked by social engineering. System users are prohibited from using such passwords, such as < company English name > @123.

As a one-stop solution provider, Raysync has independently developed its core transfer technology with its professional technical teams to offer high-performance, secure, and reliable large file transfer and file management services for major enterprises.

Share This:

You might also like

User Guide

September 27, 2021

Eight Essential Elements of Excellent File Delivery System

When "Big Data" roared through the defense line of traditional information architecture and brought unprecedented commercial data and Internet information, enterprises ushered in business opportunities and faced severe challenges.

Read more

User Guide

December 15, 2020

Raysync Security Design: Behavioral Audit

The Raysync server completely records the complete behavior logs of users logging in, logging out, uploading, downloading, changing passwords, sharing links, etc., and the administrator can regularly audit the user behavior information.

Read more

User Guide

December 14, 2020

Raysync Security Design: Software Installation

As with some other file transfer software, it takes a few steps to install Raysync including download the installation package, unzip, launch and activate it in three minutes, and then you can easily access the client.

Read more

We use cookies and similar technologies to collect information about how you interact with our website and allow us to remember you. We use this information in order to improve and customize your browsing experience and for analytics and metrics about our visitors both on this website and other media. To find out more about the cookies we use, see our Cookie Policy & Privacy.

If you decline, your information won’t be tracked when you visit this website. A single cookie will be used in your browser to remember your preference not to be tracked.