Identity authentication method with privacy protection and password retrieval function

An identity authentication and password technology, applied in user identity/authority verification, electrical components, transmission systems, etc., can solve problems such as unwillingness to provide mobile phone numbers to websites, not using emails, and infrequently using emails.

Inactive Publication Date: 2008-03-19
JIANGHAN UNIVERSITY
View PDF0 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] Method 1 is very simple, but there are the following problems: First, it requires users to provide an email address, which is a great limitation and inconvenience, because a considerable number of people do not often use email or even never use email
[0010] Method 3 is relatively safe for now, but it is not convenient enough, and many people are not willing to provide their mobile phone numbers to the website

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method with privacy protection and password retrieval function
  • Identity authentication method with privacy protection and password retrieval function
  • Identity authentication method with privacy protection and password retrieval function

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0083] 1. Dynamic link library method (general method)

[0084] As shown in Figure 1, the cslog sub-process of the client application process and a sslog sub-process of the server cooperate to complete the processes of registration, login and password retrieval described in the present invention. The server can have multiple sslog sub-processes at the same time. The cslog subprocess is generated by calling the cslog.dll library function; the sslog subprocess is generated by calling the sslog.dll library function.

[0085] The dynamic link library is divided into two library files, which may be named cslog.dll and sslog.dll. Among them, cslog.dll includes three modules czhuce, cdenglu, and cklzh for client registration, login, and password retrieval; sslog.dll includes four modules for the server: szhuce, sdenglu, sklzh, and idatabase. Except idatabase, each module runs as a thread when called, and idatabase provides the interface with the user database and related settings, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an identity authentication method with privacy protection and password recovery. When a user registers on line and / or logins, the original data input by the user are processed by data fusion and are hidden; next, the data obtained by data fusion is encrypted using one-way hash function, only the transformed results are then transmitted to a server end, the server program stores the transformed results when the user registers, and when the user logins or recovers the password, the identity authentication is accomplished by comparing the transformed results with the stored results during registration. By using the data fusion and the one-way hash function, the method encrypts the original 'question' and 'answer' data input by the user, which greatly enhances the privacy of the user's data, avoids a network manager from being attacked, greatly increases network security, avoids loss to the user caused by the user's data being stolen, and is applied for various network users to register on line and / or login.

Description

technical field [0001] The invention belongs to computer network security technology, in particular to an identity authentication method with functions of privacy protection and password retrieval. Background technique [0002] Nowadays, people rely more and more on the network, and various network services are gradually penetrating into people's study, life and work. But for various reasons, people often need to register an account first when using a certain network service, and then need to input this account number and corresponding password when logging into the service website. For security reasons, a person often needs to design different account passwords for different service websites. For example, you will never use your bank account password for your QQ. Today, with Internet services blooming everywhere, it is not uncommon for a person to have 5, 6 or even more accounts. Moreover, many websites stipulate unique design rules for account numbers and passwords, so t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/06
Inventor 程元斌
Owner JIANGHAN UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products