Network real-name system implementing method

An implementation method and technology of real-name system, applied in the field of information security, can solve the problems of high price, inability to achieve large-scale authentication, high establishment cost and maintenance cost, and achieve the effect of improving the efficiency of authentication

Inactive Publication Date: 2008-03-05
BEIJING JINAOBO DIGITAL INFORMATION TECH
View PDF0 Cites 26 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] At present, there are no practical products at home and abroad that can completely solve the network real-name system. Some network authentication products based on cryptography technology produced by some manufacturers have security loopholes, such as: KEYBORES, RADIUS, PPP, and network authentication products produced by other manufacturers are less secure. High, such as: PKI

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network real-name system implementing method
  • Network real-name system implementing method
  • Network real-name system implementing method

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0045] The implementation steps of the network real-name system are described below in conjunction with the accompanying drawings:

[0046] Figure 1: It illustrates the architecture of the network real-name system to establish a CA certification center on the network node. At the client side, each network user has a network authentication hardware device and plugs it into the client computer, and logs in to the WEB server of the network node through the Internet network. The WEB server connects the network The identity authentication task is handed over to the CA certification center. Only legitimate users who have passed the certification of the CA certification center can enter the resource or application server on the network node. The three parts of the WEB server, the CA certification center and the resource or application server are connected in series. , wherein: the CA certification center is composed of 1~K (K≤30) authentication servers, each authentication server is i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The implement method for real name system establishes center of authentication (CA) respectively for network nodes i.e. WEB server as unit. The method connects WEB server with CA and network resources or application servers (AS) in series mode. Identifiers and authentication parameters of overall network users in homeland or local area are stored in AS of CA in advance. Protocol of cryptographic authentication based on algorithm of symmetric cryptography and technique of combined symmetric cryptographic key are built in hardware chips at two ends of client and CA. all CAs in each network node can provide authentication of network ID for overall network users in homeland or local area. Each network user holds hardware device for network authentication. Through authentication of CA in each network node, resources or application server in each network node logs on network. Thus, the method implements management on networks in homeland or local government through real name system.

Description

Technical field: [0001] The invention relates to the field of information security, and uses computer network, password and chip technology to realize network identity authentication. Background technique: [0002] At present, there are no practical products at home and abroad that can completely solve the network real-name system. Some network authentication products based on cryptography technology produced by some manufacturers have security loopholes, such as: KEYBORES, RADIUS, PPP, and network authentication products produced by other manufacturers are less secure. High, such as: PKI / CA, IBE, but the establishment cost and maintenance cost are very high, they are like "Iridium" technology, even if the technology is advanced, but the high price is still ruthlessly eliminated by the market, in short, the existing None of the existing online identity authentication products can achieve large-scale authentication, and none of them can meet the market's demand for an online ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L29/06
CPCH04L63/0823H04L9/32H04L63/0435H04L9/3205H04L63/06H04L9/3234
Inventor 胡祥义
Owner BEIJING JINAOBO DIGITAL INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products