Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

System and method for login authentication

A technology for login authentication and login system, which is applied in the field of Wi-Fi login authentication based on blockchain identity authentication, which can solve the problems of deception, inability to verify other information of users, and no mention of secondary authentication, so as to achieve small security losses, cost reduction effect

Active Publication Date: 2018-10-19
上海邑游网络科技有限公司
View PDF7 Cites 25 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] However, the authentication data stored in the blockchain network and associated with the user identity representation described in the patent document CN107257340A includes the authentication results of a third-party authentication agency. Generally, there are multiple third parties, such as civil affairs bureaus, public security bureaus, schools, etc. , companies, etc., the third-party certification agency’s certification results are normal or abnormal, and the certification is passed or the certification is not passed. The shortcomings of this certification method lie in the following two points: 1. User privacy information is easily leaked The authentication result is directly written to the blockchain and stored in the public cloud, which has poor information confidentiality; 2. The verifiable identity information provided is very limited, and simple identity identification cannot meet the identity authentication requirements. For example, some services require authentication The user's mobile phone number, or the user's company name needs to be verified, and the authentication method cannot be resolved
[0008] However, the user identity authentication in the patent document CN106357640A is based on judging whether there is a first transaction in the block chain that pays from the first block chain account address to the preset second block chain account address. However, the existence of transaction records cannot To prove that the user is a legitimate user, identity authentication through transaction records is not feasible in principle, and cannot be used as a proof element of a legitimate user
Moreover, the identity authentication of the user through the transaction record can only verify that the user has traded, but cannot verify other information of the user, nor can it be used as a certificate for the user to log in to the server
Moreover, the above-mentioned patent documents do not mention secondary authentication, which is prone to deception, for example, using other user information for identity authentication, but it cannot be sure that the authentication request is the person

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for login authentication
  • System and method for login authentication
  • System and method for login authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0065] The present invention will be described in detail below in conjunction with specific embodiments. The following examples will help those skilled in the art to further understand the present invention, but do not limit the present invention in any form. It should be noted that those skilled in the art can make several changes and improvements without departing from the concept of the present invention. These all belong to protection domain of the present invention.

[0066] The system and method of login authentication of the present invention adopts the technical scheme of combining blockchain identity authentication and Wi-Fi login, which is different from the previous PKI identity authentication or SSO identity authentication. Separation, only user identity certificates, such as signatures, are stored on the blockchain, and user identity information will not be disclosed. The blockchain identity authentication separates the identity information from the identity cer...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a system and a method for login authentication. The method comprises the steps of: sending login request information by a login end, wherein the login request information comprises a user name; receiving the login request information by an authentication end, after confirming that the login end is a blockchain user, initiating blockchain identity authentication for the loginend; performing second authentication on the login end by the authentication end after the blockchain identity authentication is passed; acquiring user identity information of the login end by the authentication end, and acquiring user identification and a certification organization public key from a blockchain; and verifying the user identity information by using the user identification and thecertification organization public key by the authentication end. The system and the method of the invention have the beneficial effects that: the identification stored in the blockchain can not be tampered, thereby improving security and reducing IT maintenance cost of an enterprise; the second authentication is performed after the identity authentication is passed, thereby greatly improving enterprise level Wi-Fi security; and verification is based on the user identity information, the user does not need to input a Wi-Fi login key, thereby effectively preventing a stealing behavior of a Wi-Fiall-purpose key app.

Description

technical field [0001] The present invention relates to the field of Internet technology, in particular, to a system and method for login authentication, especially to a Wi-Fi login authentication method based on block chain identity authentication. Background technique [0002] With the development of Internet technology and enterprise information technology, Wi-Fi is widely used in terminal access in different scenarios. However, due to the low security performance of Wi-Fi, it is easy to install the Wi-Fi master key app on terminal equipment. Steal the password and share it with everyone. Once the Wi-Fi password is stolen, the corporate network is wide open for hackers to easily enter. [0003] At present, the enterprise adopts a high-security enterprise network, and Wi-Fi security adopts 802.1x+RADIUS authentication. Each user is assigned a unique user name and password, and the user name and password are strictly protected by local security. The Wi-Fi master key is diff...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/06H04W12/08H04L29/06H04W12/126
CPCH04L63/08H04L63/18H04W12/06H04W12/08
Inventor 曹正纲
Owner 上海邑游网络科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products