Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A network real-name authentication method and system

A real-name authentication and network technology, applied in transmission systems, user identity/authority verification, electrical components, etc., can solve problems such as weak security, poor implementability, and easy leakage of personal privacy, so as to achieve no leakage of personal privacy, Highly implementable effect

Active Publication Date: 2019-03-05
EIDLINK INFORMATION TECH CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0034] The purpose of the present invention is to provide a network real-name authentication method and system, which solves the problems that the current real-name authentication method is weak in security, easy to leak personal privacy, and not strong in implementability

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A network real-name authentication method and system
  • A network real-name authentication method and system
  • A network real-name authentication method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0089] In order to make the description of the present invention more detailed and complete, the embodiments and specific embodiments of the present invention will be described below with reference to the accompanying drawings; but this is not the only form for implementing or using the specific embodiments of the present invention. The various embodiments disclosed below can be combined or replaced with each other when beneficial, and other embodiments can also be added to one embodiment, without further description or illustration.

[0090] The present invention mainly uses the existing basic implementation and combines a real-name authentication gateway to complete the network real-name authentication. These infrastructures include:

[0091] (1) An electronic signature device, such as a UKey issued to a user by a bank. At present, in our country, in order to protect the security of its online banking, various banks have issued a large number of electronic signature devices...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a network real-name authentication method and system. The method comprises: (a), a user obtains an electronic signature apparatus, wherein a digital certificate and a private key are stored into the electronic signature apparatus and the digital certificate is awarded by a CA mechanism; (b), a user visits a service system, fills in identity information, and sends a real-name authentication request message to a real-name authentication gateway; (c), the real-name authentication gateway drives the electronic signature apparatus to realize signature on a terminal by using the private key and uploads the signature and the digital certificate to the real-name authentication gateway by the terminal; (d), the real-name authentication gateway is connected to the CA mechanism to carry out identity verification and a verification result is returned; (e), the real-name authentication gateway is connected to a police population database to carry out identity checking and a checking result is returned; (f), the real-name authentication gateway receives the verification result and the checking result and the results are combined into an authentication result that is sent to a service system; and (g), the service system carries out processing on the authentication result and a processing result is generated, and a further service operation is determined based on the processing result.

Description

technical field [0001] The invention relates to a network real-name authentication method and system. Background technique [0002] With the penetration and deepening of the Internet in various industries, there are more and more scenarios that need to realize the network real-name system, such as micro-blog real-name system, mobile phone SIM card real-name system, remote medical registration, electronic case inquiry, electronic account opening in banks and securities industries, etc. . Affected by regulatory policies, etc., all of these require real-name authentication of users before they can be operated. [0003] At present, there is no good solution for online real-name authentication. The solutions available on the market mainly include identity information inspection, uploading the electronic version of ID card (scanned copy or photo), or remote face recognition. However, there are certain problems in the above-mentioned solutions. [0004] Identity information ver...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L29/06
Inventor 袁松
Owner EIDLINK INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products