Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network identity authentication system and method

A network identity and authentication system technology, applied in user identity/authority verification, transmission systems, electrical components, etc., can solve problems such as information leakage, easy password guessing, data exposure, etc., to ensure security and achieve the effect of security

Inactive Publication Date: 2010-03-17
ZHEJIANG NORMAL UNIVERSITY
View PDF0 Cites 140 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] Through the security analysis of this login method, it is found that the disadvantages are very obvious, and there are many obvious security risks
[0008] First of all, in this way, the password is easily forgotten or stolen
It is understood that the user passwords stored in the database are very simple, many of which are simple numbers from 1 to 9. Many managers do not want to use longer and more irregular passwords, which is completely understandable, but passwords are easy to guess. This situation cannot be ignored
In addition, when the two parties communicate with each other, there is no identity authentication. If one party encounters computer hacker attacks, computer viruses, malicious program attacks, etc., the other party may not receive or delay receiving information, which will cause unnecessary Loss
[0009] Secondly, in some system designs, passwords are actually stored in plain text in the database, which poses a potential threat of information leakage or data exposure, and it is difficult to resist cross-site attacks and SQL script injection password attacks
[0010] Furthermore, the security vulnerabilities of the Windows system are constantly updated in the form of patches. For office workers, it is difficult to understand these complex technologies and update the operating system frequently.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network identity authentication system and method
  • Network identity authentication system and method
  • Network identity authentication system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0070] The technical solutions of the present invention will be further described in detail below with reference to the drawings and specific embodiments, but the protection scope of the present invention is not limited thereto.

[0071] refer to figure 1 , a network identity authentication system, comprising: an authentication center CA module, an authentication module, a client and a USB Key module.

[0072] The CA module of the certification center is responsible for the application, approval, issuance, renewal and revocation of certificates;

[0073] The authentication module mainly includes a control agent module and an authentication server. The control agent module mainly completes the interception of the request connection sent by the user to the resource server authentication, and forwards it to the authentication server for user identity authentication, ensuring that when the information is normally transmitted, the user The separation of information database and au...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an identity authentication system and an authentication method. The identity authentication system comprises an authentication center CA module, an authentication module, a client side and a USB Key module, wherein the authentication center CA module is responsible for the functions of application, examination and approval, issuing, updating and revocation of a certificate; the authentication module respectively carries out the generation of a digital envelope and the authentication of a digital certificate to the client side and a server side; the client side mainly realizes the management of the system and the clients; and the USB Key module mainly provides a medium for storing the digital certificate and a user private key to the user. The invention adopts a digital envelope technology, and can meet the high-confidentiality requirement of data transmission; an authentication token is used for sending a request to the authentication server by the client sidefor authentication and realizing the security of the authentication process; and the client side and the authentication server respectively carry out the generation of the digital envelope and the digital certificate, thus being capable of realizing the mutual authentication between the client side and the authentication server.

Description

technical field [0001] The present invention relates to a network identity authentication system and method, in particular to a network identity authentication system and an implementation method. Background technique [0002] The security guarantee of network data transmission on the Internet has been widely concerned and valued by domestic and foreign academic circles and industrial circles. After years of research and exploration, a complete set of network security solutions and technical specifications have been initially formed-Public Key Foundation Facilities (Public Key Infrastructure, PKI), PKI technology is the infrastructure for providing information security services established by applying public key theory and technology. It uses digital certificates as the medium, combines symmetric encryption and asymmetric encryption technology, and binds the user's public key and other identification information (such as name, E-mail, ID number, etc.) of the user together. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/32
Inventor 朱信忠赵建民徐慧英俞承永
Owner ZHEJIANG NORMAL UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products