Unlock instant, AI-driven research and patent intelligence for your innovation.

A secure protection method and system with dual identity authentication

A technology of identity authentication and security protection, applied in the field of identity authentication, can solve problems such as illegal intrusion by others, and achieve the effect of increasing the probability of arresting criminal suspects

Inactive Publication Date: 2008-05-28
唐荣华
View PDF0 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The present invention solves the problem in the prior art that others can illegally intrude after the password used for single authentication is illegally obtained by others, and provides a security protection method and system that have verification information with peers, thereby establishing a dual-identity authentication mechanism, Make the companions have the opportunity and conditions to know and judge the suspected intrusion behavior

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A secure protection method and system with dual identity authentication
  • A secure protection method and system with dual identity authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The method and system of the present invention will be further described below.

[0027] The method of the invention sets two authentication relationships for the local machine: a companion authentication relationship and a local authentication relationship, so as to perform peer verification and local verification respectively. The method of the present invention enables the machine operated by the master to establish a communication link with the peer, and establishes peer verification information to form a peer authentication relationship. The peer verification information includes the agreement between the machine and the peer, called a peer agreement, based on the peer authentication The verification is peer verification, and the peer agreement includes the identification information of the peer to the machine, the agreement on the specific communication between the peer and the machine; the method of the present invention sets the verification information of the ma...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a dual ID authentication security protection method and the system thereof, wherein, the method consists of the following steps: A, a local machine which is operated by a host is linked to a partner of the host, and the information for the authentication of the partner is created to form a partner authentication relation, and the partner is validated on the basis of the partner authentication relation; B, the validation information for the local machine is set by the host, and the local machine validation information includes a password, contractual main content and notification communications so as to form a local machine authentication relation of the legal operator of the local machine, and the local machine is validated based on the validation of the local machine authentication relation; in the process of validating the local machine, the notification communication with the partner starts up when the contractual main content is met; thirdly, the partner validation is validated ahead of the local machine validation. The invention enables the partner to have the opportunities and conditions to know and judge the suspicious behavior of invasion on the local machine, and to contact the host and at last determine the legitimacy of the behavior.

Description

technical field [0001] The invention belongs to the field of identity authentication, and in particular relates to a method and a system for setting security authentication on an identity. Background technique [0002] The current identity verification technologies are all anti-counterfeiting mechanisms for verifying a single authentication relationship. For example, they all use a single password. In order to improve confidentiality and prevent the password from being deciphered, the existing technology is to set various complex encryptions for the password itself. means. However, once the password is intercepted, deciphered or stolen, the intruder can do whatever he wants to the local machine with the identity verification, while others cannot judge its legitimacy. For example: once the key of the vehicle is lost, the car may be lost. Here, the specific structure of the key can be regarded as a single password to open the car. The prior art is all trying to improve this p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/06
Inventor 唐荣华
Owner 唐荣华