Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Composite identity authentication-based network trading system

A network transaction and identity authentication technology, which is applied in the field of composite identity authentication network transaction system, can solve the problems of inability to adapt to the network transaction environment and lengthy transaction process, and achieve both versatility and security, clear division of public and private, and guaranteed security sexual effect

Pending Publication Date: 2018-10-23
孔德键
View PDF3 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

When the user is shopping on the network platform, the user needs to enter his own relevant information to clarify the user's identity, and then further confirm the order information and submit it. The electronic transaction system receives the order information submitted by the user, and then deducts the user's account with the help of the payment system. cash, thus completing a transaction process, which is lengthy and unable to adapt to the growing network transaction environment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Composite identity authentication-based network trading system
  • Composite identity authentication-based network trading system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] The network transaction system of composite identity authentication of the present invention, such as figure 1 and figure 2 As shown, it includes a verification device 2 and a plurality of terminals 1, and is characterized in that it also includes: a privacy database 3 for recording the user's private information, a first private chain 4 for recording the authentication and encryption information, and a first private chain 4 for recording the information related to the user. The second private chain 5 and the public chain 6 of the mapping relationship linked by the privacy database 3; each terminal 1 is respectively linked with the first private chain 4, the second private chain 5, and the public chain 6 and forms corresponding network nodes.

[0034] The terminal 1 includes a data input terminal 11 for obtaining external verification information, a read-only storage unit 12 recorded with independent physical information, a temporary storage unit 13, a processing unit ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a composite identity authentication-based network trading system. The system comprises a verification device and multiple terminals. The system further comprises a privacy database used for recording privacy information of a user, a first private network which records multiple pieces of authentication encryption information, a second private network which records a mapping relationship linked with the privacy database, and a public network; the terminals are linked with the first private network, the second private network and the public network, and corresponding network nodes are formed; the terminals accessing the private network become nodes in the private network, and the application of the multiple nodes further ensures the security of data storage in the private network; and by applying settings of the first private network and the second private network, the universality and security of an information obtaining mode are taken into account while the terminal authentication requirements of different security level settings are met.

Description

technical field [0001] The invention relates to the technical field of network transactions, in particular to a complex identity authentication network transaction system. Background technique [0002] In the prior art, there are various authentication methods, such as passwords (withdrawal passwords, account login passwords, etc.), biological information (fingerprints, iris, sound waves, vein information, etc.), physical information (keys, smart cards, NFC, etc.) Verification application; however, password verification is easy to be obtained by others through recording, monitoring, etc., and the security is low; biometric verification may be cracked by simulation and copying, and biometric information is mainly stored by a single department or terminal and applied to different The terminal needs to be repeatedly entered, and the application is inconvenient; the verification of physical information is easy to be copied or stolen, or the application is invalid due to the loss...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06Q20/38G06Q20/40H04L29/06H04L29/08
CPCH04L63/0428H04L63/083H04L63/0861H04L63/0876H04L63/102H04L63/12H04L67/1095G06Q20/3829G06Q20/40145
Inventor 孔德键
Owner 孔德键
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products