Network real-name authentication method and system
A real-name authentication and network technology, which is applied in the field of network and information security, can solve the problems of not being able to confirm the authenticity of the identity of network activity personnel with physical characteristics, so as to eliminate unauthorized access to network resources with forged identities, overcome identification problems, and eliminate criminals Effects of denial of authorized access to network resources
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0015] What this embodiment describes is a network real-name authentication method and system, the system used by the method includes: an authentication terminal, a real-name authentication server, such as figure 1shown. The authentication terminal is used for identifying digital signatures and compiling passwords; the operation interface of the authentication terminal is provided with regular keys for addition, regular keys for subtraction, regular keys for multiplication, regular keys for misplacement, regular keys for carry, and rules for abdication key, number regular key of 1, number regular key of 2, number regular key of 3, number regular key of 4, number regular key of 5, number regular key of 6, number regular key of 7, number regular key of 8, 9 digital rule keys and fingerprint keys, including 6 digits of the dynamic password; based on the operation rule key and fingerprint key identity authentication and dynamic password digital signature code; the authentication t...
Embodiment 2
[0027] This embodiment is an improvement in the network real-name authentication method and system described in Embodiment 1 in the steps of network real-name authentication through identity identification rule keys, identity certification fingerprints, and human behavior, such as image 3 shown.
[0028] The sub-steps in the steps of performing network real-name authentication through identity identification rule keys, identity certification fingerprints and human behavior include:
[0029] The real-name authentication server dynamic password survival module survives the substep of the dynamic password sending authentication terminal operation interface;
[0030] The sub-steps of real-name authentication of operating authentication terminal rule key and fingerprint key by the network activity personnel through the identity identification rule key and identification fingerprint and human behavior;
[0031] The authentication terminal is based on the operation rule key and fin...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com