Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network real-name authentication method and system

A real-name authentication and network technology, which is applied in the field of network and information security, can solve the problems of not being able to confirm the authenticity of the identity of network activity personnel with physical characteristics, so as to eliminate unauthorized access to network resources with forged identities, overcome identification problems, and eliminate criminals Effects of denial of authorized access to network resources

Inactive Publication Date: 2020-05-26
BEIJING PASSWORD TECH
View PDF4 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Due to the current network identity authentication method, the authentication system can only confirm the legitimacy of what is known and possessed, including the unique physical characteristics, but cannot confirm the authenticity of the identities of network activity personnel, including the unique physical characteristics.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network real-name authentication method and system
  • Network real-name authentication method and system
  • Network real-name authentication method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0015] What this embodiment describes is a network real-name authentication method and system, the system used by the method includes: an authentication terminal, a real-name authentication server, such as figure 1shown. The authentication terminal is used for identifying digital signatures and compiling passwords; the operation interface of the authentication terminal is provided with regular keys for addition, regular keys for subtraction, regular keys for multiplication, regular keys for misplacement, regular keys for carry, and rules for abdication key, number regular key of 1, number regular key of 2, number regular key of 3, number regular key of 4, number regular key of 5, number regular key of 6, number regular key of 7, number regular key of 8, 9 digital rule keys and fingerprint keys, including 6 digits of the dynamic password; based on the operation rule key and fingerprint key identity authentication and dynamic password digital signature code; the authentication t...

Embodiment 2

[0027] This embodiment is an improvement in the network real-name authentication method and system described in Embodiment 1 in the steps of network real-name authentication through identity identification rule keys, identity certification fingerprints, and human behavior, such as image 3 shown.

[0028] The sub-steps in the steps of performing network real-name authentication through identity identification rule keys, identity certification fingerprints and human behavior include:

[0029] The real-name authentication server dynamic password survival module survives the substep of the dynamic password sending authentication terminal operation interface;

[0030] The sub-steps of real-name authentication of operating authentication terminal rule key and fingerprint key by the network activity personnel through the identity identification rule key and identification fingerprint and human behavior;

[0031] The authentication terminal is based on the operation rule key and fin...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the field of network and information security, and in particular relates to a network real-name authentication method and system in the field of network and information security. The network real-name authentication system disclosed by the invention comprises an authentication terminal and a real-name authentication server, wherein the authentication terminal is used for compiling a password for an identity authentication digital signature, and the real-name authentication server is used for controlling access of remote network resources and providing comprehensive real-name authentication and auditing services. According to the invention, the authentication terminal is provided with a microprocessor for receiving a dynamic password sent by the real-name authentication server; the method comprises an operation rule key, a fingerprint key, a memory identity identification rule key and identity authentication fingerprint identity authentication; an instruction secret key signature module and a dynamic password operation digital signature compile a password, and send the password to the real-name authentication server to decrypt and restore the dynamic password, so as to accurately confirm the mutual identity authenticity real-name authentication of the operation rule key and the fingerprint key network activity personnel, and ensure the absolute securityof network resource authorized access.

Description

technical field [0001] The invention relates to the field of network and information security, in particular to a network real-name authentication method and system in the field of network and information security. Background technique [0002] The current network identity authentication is based on three methods of knowing and possessing things including unique physical characteristics to confirm the authenticity of each other's identities. The first way is known, such as static password or dynamic password and so on. The authentication system confirms the authenticity of each other's identities by logging in with static passwords or dynamic passwords. Authentication-based systems can only confirm the legitimacy of static passwords or dynamic passwords, but cannot confirm the authenticity of each other's identities with static passwords or dynamic passwords. If the static password or dynamic password is attacked, the attacker can forge the identity and access the network ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
CPCH04L9/3228H04L9/3231H04L63/083H04L63/0838H04L63/0861
Inventor 不公告发明人
Owner BEIJING PASSWORD TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products