System, device and method for identity security authentication

A technology of identity authentication and security authentication, which is applied to user identity/authority verification and key distribution, which can solve problems such as complex key management, low efficiency, and reduced user identity authentication security, and achieve the effect of protecting privacy and improving security

Inactive Publication Date: 2008-10-22
HUAWEI TECH CO LTD
View PDF0 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0017] figure 1 The architecture shown uses the URL to authenticate the user's identity, so it is only applicable to the Internet, not to the mobile network.
In addition, the means of user identity authentication is single, and only URL can be used to authenticate user identity.
[0018] figure 1 The architecture shown cannot meet the need for privacy protection of user identity when authenticating user identity
The privacy protection of stored user identity information on the network side is realized by encrypting user identity information, but this method brings problems such as low efficiency and complex key management, and the security of protecting user identity information privacy is not high
In addition, when authenticating the user's identity, the user's real URL is still used for authentication, which will reduce the security of user identity authentication

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System, device and method for identity security authentication
  • System, device and method for identity security authentication
  • System, device and method for identity security authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] In order to make the object, technical solution and advantages of the present invention clearer, the embodiments of the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0041] The embodiment of the present invention establishes a user identity authentication management framework in the network, which can manage different user identity information of a user according to the business type, effectively protecting the privacy of the user identity information; User virtual identity UVID authentication improves the efficiency and security of user identity authentication.

[0042] figure 2 It is a schematic diagram of a user identity authentication management framework established in the network according to an embodiment of the present invention, including: a user identity authentication center (UIAC, User Identity Authentication Center), an identity authentication center (IDAC, Identity Authentication Center) and a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a system, a device and a method for safe identity authentication. The system comprises an identity authentication center, a user identity authentication center and a service processing unit, wherein, the user identity authentication center is used for distributing identity authentication center identification to the identity authentication center and distributing identification to the service processing unit; the identity authentication center is used for distributing user virtual identification uniquely identifying the user to the user register and for sending the user virtual identification and the distributed user identity authentication center identification to the user; and the service processing unit is used for receiving a service request, authenticating the user according to the user virtual identification and the user identity authentication center identification carried by the request and processing the service request. The system, the device and the method can not only improve the security of the user identity authentication but also effectively protect the privacy of the user identity information.

Description

technical field [0001] The invention relates to identity authentication technology in the network, in particular to a system, device and method for identity security authentication. Background technique [0002] With the popularization of telecommunication networks and Internet applications, more and more users begin to receive services through the Internet. When receiving services through the network, identity authentication is required. Most of the networks that provide services currently use user names and passwords to identify user identities, which requires users to frequently input their own user names and passwords. There are disadvantages in this identity authentication method: on the one hand, as users accept more and more different services provided by different networks, users need to input different passwords when performing different network authentications, which causes unnecessary cumbersome processes and memory problems for users. On the other hand, users fr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/08
Inventor 刘宏伟丁小燕庄小君
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products