Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network user identification verification method, server and client terminal

An identity verification method and identity verification technology, applied in the field of computer network security, can solve problems such as illegal use

Active Publication Date: 2009-06-24
PEKING UNIV +2
View PDF0 Cites 72 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The embodiment of the present invention provides a network user identity verification method, server and client to solve the problem in the prior art that the user name and corresponding password input by the user may be intercepted and used illegally during the network transmission process

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network user identification verification method, server and client terminal
  • Network user identification verification method, server and client terminal
  • Network user identification verification method, server and client terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0116]Due to the existing technology in the process of network user identity verification, the user needs to send the input user name and corresponding password information to the identity verification server in the network application system through the terminal, and the user name and corresponding password information may be transmitted during network transmission. intercepted and illegally used. To solve this problem, the technical solution proposed by the present invention only sends the user name to the identity verification server when the user logs in to the identity verification server, and then encrypts it by comparing the password sent by the client based on the user input. Whether the ciphertext is the same as the ciphertext encrypted based on the corresponding password of the user found in the user information database, to determine the identity verification result of the logged-in user. Adopting this solution preferably avoids the above-mentioned problems existing ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a network user identity authentication method, a server and a client, which solve the problem that user ID and password inputted by a user can be possibly intercepted and used illegally in network transmission process in the prior art. The identity authentication method includes that an identity authentication server receives a user ID sent from a client, and searches the password corresponding to the sent user ID in the corresponding relation of user ID and password; then the identity authentication server sends a random character string to the identity authentication client and encrypts the random character string to acquire a first encrypted cryptograph based on the searched password; the identity authentication server receives a second encrypted cryptograph sent from the identity authentication client; the identity authentication client encrypts a random character string based on the password inputted by user, so as to acquire the second encrypted cryptograph; the consistency of the first encrypted cryptograph and the second encrypted cryptograph is judged to determine the identity authentication result of the network user.

Description

technical field [0001] The invention relates to the technical field of computer network security, in particular to a network user identity verification method, server and client. Background technique [0002] With the rapid development of Internet technology, abundant network resources have brought great convenience to people's daily life. For example, people can communicate through instant messaging systems, and share video files through online video-on-demand. In order to ensure the security of network resources and to share network resources within the scope of authorized users, authentication is usually performed on users when they access network application systems. [0003] Please refer to the attached figure 1 , the basic principle of the existing network user authentication technology is: the user logs into the network application server, such as instant messaging (IM, Instant Messaging) system, file transfer protocol (FTP, File Transfer Protocol) server or electron...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/06
Inventor 乐以长
Owner PEKING UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products