A secure protection method and system with dual identity authentication
An identity authentication and security protection technology, applied in the field of identity authentication, can solve the problem of illegal intrusion by others, and achieve the effect of increasing the probability of catching criminal suspects on the spot
Inactive Publication Date: 2010-03-03
唐荣华
View PDF4 Cites 0 Cited by
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
The present invention solves the problem in the prior art that others can illegally intrude after the password used for single authentication is illegally obtained by others, and provides a security protection method and system that have verification information with a partner, thereby establishing a dual-identity authentication mechanism , so that the companions have the opportunity and conditions to know and judge the suspected intrusion behavior
Method used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View moreImage
Smart Image Click on the blue labels to locate them in the text.
Smart ImageViewing Examples
Examples
Experimental program
Comparison scheme
Effect test
Embodiment Construction
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More PUM
Login to View More Abstract
The invention discloses a dual ID authentication security protection method and the system thereof, wherein, the method consists of the following steps: A, a local machine which is operated by a hostis linked to a partner of the host, and the information for the authentication of the partner is created to form a partner authentication relation, and the partner is validated on the basis of the partner authentication relation; B, the validation information for the local machine is set by the host, and the local machine validation information includes a password, contractual main content and notification communications so as to form a local machine authentication relation of the legal operator of the local machine, and the local machine is validated based on the validation of the local machine authentication relation; in the process of validating the local machine, the notification communication with the partner starts up when the contractual main content is met; thirdly, the partner validation is validated ahead of the local machine validation. The invention enables the partner to have the opportunities and conditions to know and judge the suspicious behavior of invasion on the local machine, and to contact the host and at last determine the legitimacy of the behavior.
Description
technical field The invention belongs to the field of identity authentication, and in particular relates to a method and a system for setting security authentication on an identity. Background technique The current identity verification technologies are all anti-counterfeiting mechanisms for verifying a single authentication relationship. For example, they all use a single password. In order to improve confidentiality and prevent the password from being deciphered, the existing technology is to set various complex encryptions for the password itself. means. However, once the password is intercepted, deciphered or stolen, the intruder can do whatever he wants to the local machine with the identity verification, while others cannot judge its legitimacy. For example: once the key of the vehicle is lost, the car may be lost. Here, the specific structure of the key can be regarded as a single password to open the car. The prior art is all trying to improve this password and make...
Claims
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More Application Information
Patent Timeline
Login to View More Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L29/06
Inventor 唐荣华
Owner 唐荣华



