Authentication management system, method and device

A technology for authentication management and authentication requests, applied in security devices, electrical components, wireless communications, etc., can solve the problems of leaking account numbers, passwords, user economic losses, monitoring, interception, etc., to achieve the effect of ensuring security

Active Publication Date: 2019-09-10
喀斯玛(北京)科技有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] At present, scenarios such as using user terminals to operate online banking, conduct e-commerce transactions, and rich media (Rich Communication Suit, RCS) communications are becoming more and more common. Wi-Fi networks in public places may be malicious, and malicious Wi-Fi networks may affect network messages. It will be very easy to monitor and intercept, even in a secure Wi-Fi network or operator data network, there is a possibility of network messages being monitored and intercepted
[0003] For example, when a user logs in to an e-commerce website for online shopping and completes the transaction, the user needs to enter sensitive information such as payment account number and password. The network between the terminal operated by the user and the server of the e-commerce website or the payment server is unreliable. Yes, it may be monitored and intercepted by hackers, thus leaking information such as account numbers and passwords, resulting in economic losses for users
Therefore, a secret key for encryption needs to be negotiated between the user terminal and the server to encrypt the communication content. At present, in practical applications, there are two schemes for establishing a secure encrypted channel. One scheme is to use the key exchange algorithm Obtain the key for communication between the two parties to encrypt the communication content. This key exchange scheme cannot solve the problem of man-in-the-middle attacks and cannot guarantee the security of communication; another solution is to use public and private keys and certificates to obtain the key for communication between the two parties , used to encrypt the communication content. In this scheme, one party to the communication needs to apply for a certificate from an authoritative certificate issuing center (CertificateAuthority, CA), which needs to pay a certain fee. Usually, the certificate has a certain validity period and needs to be replaced regularly.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication management system, method and device
  • Authentication management system, method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0024] An authentication management system, the system includes: authentication requesting units arranged on different computer devices; each of the authentication requesting units at least includes: a radio frequency unit, a network identification storage unit, an authentication verification unit and a wireless data transmission unit; The system also includes a network construction unit arranged on different computer devices; the network construction unit responds to the command of the authentication request unit to construct an encryption subnetwork, and the encryption subnetwork is used for data transmission between two computers that have passed the authentication verification .

[0025] specific,

Embodiment 2

[0027] On the basis of the previous embodiment, the authentication verification unit includes: a radio frequency identification ID verification module, a network identification ID verification module and a distance verification module; the radio frequency identification ID verification module verifies the radio frequency ID of the other device; the The network identification ID verification module is used to verify the network identification ID of the other device; the distance verification module is used to verify the distance of the other device.

Embodiment 3

[0029] On the basis of the previous embodiment, each computer device has at least one network construction unit.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of network authentication, and particularly relates to an authentication management system, method and device. The system comprises authentication requestunits arranged on different computer devices; each authentication request unit at least comprises a radio frequency unit, a network identifier storage unit, an authentication verification unit and a wireless data transmission unit; the system further comprises network construction units arranged on the different computer devices. And the network construction unit responds to a command of the authentication request unit and constructs an encryption sub-network, and the encryption sub-network is used for data transmission of two computers passing authentication verification. The method has the advantage of high safety, and meanwhile, automatic authentication connection is realized.

Description

technical field [0001] The invention belongs to the technical field of network authentication, and in particular relates to an authentication management system, method and device. Background technique [0002] At present, scenarios such as using user terminals to operate online banking, conduct e-commerce transactions, and rich media (Rich Communication Suit, RCS) communications are becoming more and more common. Wi-Fi networks in public places may be malicious, and malicious Wi-Fi networks may affect network messages. It will be very easy to monitor and intercept network messages even in secure Wi-Fi networks or operator data networks. [0003] For example, when a user logs in to an e-commerce website for online shopping and completes the transaction, the user needs to enter sensitive information such as payment account number and password. The network between the terminal operated by the user and the server of the e-commerce website or the payment server is unreliable. Ye...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/00H04W12/06H04W12/03H04W12/69
CPCH04W12/06H04W12/03H04W12/69
Inventor 不公告发明人
Owner 喀斯玛(北京)科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products