Raysync Security Design: Account&Password Protection
December 11, 2020Raysync is designed with multiple security protection based on the account number and password of the user. Specific security design is as follows:
Account protection security design
Login authentication has a built-in anti-violence cracking mechanism, if the user enters the wrong password five times within 3 minutes, the account will be automatically locked.
Session identification in login is generated by using the interface of OpenSSL high-strength random function RAND_bytes () to prevent random information from being hit by the simulator.
Password protection security design
In the transfer process, the user password is encrypted by the asymmetric high-strength encryption algorithm, and even if the transfer message is intercepted, the attacker can not recover the plaintext through ciphertext.
The information stored in the database of the user password is irreversibly encrypted 10,000 times in one direction by using the PBKDF2 algorithm and the user's individual random salt. Even if the database information is leaked, the user password cannot be reversed through ciphertext.
The password must be a combination of case, number and special symbols, and the length is greater than or equal to 8 characters.
The system provides a weak password dictionary. Users can customize weak passwords that meet the password strength but are easy to be cracked by social engineering. System users are prohibited from using such passwords, such as < company English name > @123.
As a one-stop solution provider, Raysync has independently developed its core transfer technology with its professional technical teams to offer high-performance, secure, and reliable large file transfer and file management services for major enterprises.
You might also like
![Application of Raysync Point-to-Point Transfer](http://images.ctfassets.net/bg6mjhdcqk2h/1AJo9Rd4K4aU9EYlFNaEGV/9b2f8e0d826a82f420d821924adf06e2/1.jpg)
User Guide
December 13, 2022Click Start to transfer, one record in the direct transfer file list is one task number, and if multiple records are displayed, it will be regarded as multiple tasks.
![Raysync Security Design: Account&Password Protection](http://images.ctfassets.net/bg6mjhdcqk2h/18xMUEiYwMdpYw6X59tY0a/8b6474de8173645f2fdfe19bacf55f28/_________________74_.png)
User Guide
December 11, 2020The system provides a weak password dictionary. Users can customize weak passwords that meet the password strength but are easy to be cracked by social engineering.
![[2024 Guide] How to Buy A File Sharing Software](http://images.contentful.com/bg6mjhdcqk2h/5FkRT8pP5ZBb0luQPHJUcE/69e8fc10fb06daa57ac8b5294885f296/file-sharing-software.png)
User Guide
April 28, 2022Choosing the right file sharing software is critical to the success of the organization. It is important to understand the differences between file sharing solutions and when each solution is appropriate.