Network access control system and its control method

A technology for network access control and access request, applied in the direction of user identity/authority verification, instrument, character and pattern recognition, etc., can solve the problems of easy to forget passwords, hidden dangers, inconvenient use, etc., to achieve the effect of confidentiality

Inactive Publication Date: 2007-09-12
上海品伟数码科技有限公司
View PDF0 Cites 40 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Username / password is the simplest and most commonly used identity authentication method, but the password is easily forgotten and stolen by others. Although the current system prevents password theft by requiring users to change their passwords in time, this method not only increases The user's memory burden is reduced, and the problem cannot be solved fundamentally; the dynamic password technology adopts the one-time pad method, which effectively guarantees the security of the user's identity. There may be a problem that legitimate users cannot log in, and users need to enter a long string of irregular passwords through the keyboard every time they log in. Once they enter a mistake, they will have to re-operate, which is very inconvenient to use; IC card is a built-in integrated circuit. Chip, the data related to the user's identity is stored in the chip, and the IC card is carried by the legal user. When logging in, the IC card must be inserted into a special card reader to read the information in order to verify the user's identity. The data read in the IC card is static, and it is still easy to intercept the user's identity verification information through memory scanning or network monitoring and other technologies, so there are still potential security risks; as a storage medium for digital certificates, USB Key is mainly used in the PKI environment Under the network identity authentication, this kind of product is established under the CA certification center model, and needs to establish the certification certificate management center, the key distribution and management center and the CA certification center. This method requires a lot of investment and high daily management costs. And management is very cumbersome. In addition, the CA certification center is regional. If the user travels to other countries, the CA model cannot serve these users; biometric authentication refers to the use of each person's unique biometrics to verify the user's identity. It has the advantages of not being forgotten, good anti-counterfeiting performance, not easy to forge or be stolen, "carry" with you, and available anytime, anywhere, etc.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network access control system and its control method
  • Network access control system and its control method
  • Network access control system and its control method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] The present invention will be further described below in conjunction with the accompanying drawings and embodiments.

[0019] A network access control system, comprising a client personal computer 1, a server-side network server 2, characterized in that the network access control system also includes a fingerprint collector 3, the fingerprint collector 3 is installed on the client personal computer 1, used To collect fingerprint information; fingerprint authentication and authorization server 4 is connected with network server 2, is used for depositing user's fingerprint data and access authority list, and the fingerprint information that the fingerprint collector 3 that transmits by network server 2 newly collects is authenticated; The network access control agent unit 5 is installed on the network server 2 and is connected with the fingerprint authentication and authorization server 4; the network redirection service unit 6 is installed on the network server 2 to force...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a network access control system, comprising network reorienting service unit and network access control agent unit installed on network server, fingerprint authentication and authorization server connected with the network access control agent unit, and client end computer equipped with fingerprint collector. And the system implements control of the network server access, and has an obvious advantage of being able to complete interactive information encryption between network browser and network server and access control of the network server only in need of simple configuration without changing client's network environment and second development, where the system implements secrecy and integrity of information transmission and interaction by PKI technique, and implements user ID authentication by fingerprint recognition technique, and implements access control of the network server by united access authorization mechanism.

Description

Technical field: [0001] The invention relates to a network access control system. Background technique: [0002] In order to control the user's access to the web server, the traditional method is to embed the user authority code in each page of the website. This code judges whether a user has the authority to access the page by accessing the database. Since each page needs to contain The extra code needs special maintenance, which has the problems of complicated management and high cost, and is not conducive to the expansion of the system. In order to establish a secure communication channel between the web browser and the web server, the traditional method is to bundle the software supporting SSL communication with the web server. Since there are many types of web servers, the configurations are different, and the implementation is more troublesome. . Based on the problems existing in the above-mentioned technologies, some specialized SSL proxy products have emerged as th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32G06K9/00
Inventor 甄秀峰
Owner 上海品伟数码科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products