Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Multi-channel active type network identity verification system and network identity verification device

A network identity and verification device technology, applied in transmission systems, security devices, wireless communications, etc., can solve the problems of tampering with network transactions, users' money losses, and the inability to effectively verify the authenticity of network users' identities and network transaction security. Strengthening correctness and reliability, improving non-repudiation and security

Inactive Publication Date: 2013-06-05
JRSYS INT
View PDF3 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Even if the above-mentioned dynamic password has a time limit, it is still enough for malicious people to pretend to be the user's identity and tamper with the content of online transactions within the validity period of the password, causing the user's money loss
[0007] In addition, there have also been cases where hackers pretended to be users and lied to the telecommunications company about the loss of the mobile phone SIM card, and obtained a SIM card with the same phone number from the telecommunications company.
At this time, the hacker can receive the dynamic password issued by the online banking system to the user, and use the online banking service as the user's identity, causing the user's money loss
[0008] It can be seen from the above description that the method and system proposed in Taiwan Patent No. I288554 still have obvious information security loopholes, and cannot effectively verify the identity authenticity of network users and ensure the security of network transactions

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-channel active type network identity verification system and network identity verification device
  • Multi-channel active type network identity verification system and network identity verification device
  • Multi-channel active type network identity verification system and network identity verification device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] Embodiments of the present invention will be described below in conjunction with related drawings. In these drawings, the same reference numerals represent the same or similar elements or processes / steps.

[0023] Certain terms are used in the specification and following claims to refer to particular elements. It should be understood by those skilled in the art that the same element may be referred to by different names. This description and the subsequent claims do not use the difference in name as the way to distinguish components, but the difference in function of the components as the basis for distinction. "Includes" mentioned throughout the specification and subsequent claims is an open-ended term, so it should be interpreted as "including but not limited to...".

[0024] The description of "and / or" used herein includes any combination of one or more of the listed items. In addition, unless otherwise specified in this specification, any singular term also inclu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides one of multi-channel active type network identity verification systems. The multi-channel active type network identity verification system comprises a user end device and a service providing end system. The service providing end system comprises a service processing module and a safety certificating module. When the service processing module receives a service request sent from the user end device through a first transmission channel, the safety certificating module can generate a challenge value through a challenge response algorithm, and the service processing module is used for transmitting the challenge value to the user end device. The user end device generates a response value corresponding to the challenge value through a verification data generating module, the response value is encrypted to generate safety verification data, then the safety verification data is sent back to the safety verification module in a short message mode through a second transmission channel, and a network identity verification program can be completed. According to the system, non-repudiation and safety of the safety verification data sent by the user end device can be improved, and accuracy and reliability of network identity verification can be effectively strengthened.

Description

technical field [0001] The invention relates to a network security control mechanism, in particular to a multi-channel active network identity verification system and related multi-channel network identity verification devices and active network identity verification devices. Background technique [0002] With the increasing popularity of various network service applications, the importance of network information security is also increasing. The traditional way to log in to remote network service systems (such as online banking, online ordering, online games, enterprise internal network systems, etc.) is to use the user account and password to verify the identity of the login. Along with malicious programs such as Trojan horse programs, keyloggers, screen loggers, phishing, man-in-the-middle attacks, replay attacks, etc. The advancement of technology has made the identity verification method that only uses user account numbers and passwords face major information security t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08H04W12/06
Inventor 陈嘉宏
Owner JRSYS INT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products