Apparatus, system and method for implementing identification authentication

An identity authentication, authentication and authorization technology, applied in the authentication field, can solve the problems of harming the interests of legitimate users, hidden dangers, and low security of identity authentication.

Inactive Publication Date: 2009-02-25
POTEVIO INFORMATION TECH
View PDF0 Cites 29 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since the data read from the IC card is static each time, it is easier for an attacker to intercept the user's identity verification information through memory scanning or network monitoring, so there is a big security risk
[0020] It can be seen from the above that the existing commonly use

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Apparatus, system and method for implementing identification authentication
  • Apparatus, system and method for implementing identification authentication
  • Apparatus, system and method for implementing identification authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0127] In order to make the purpose, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0128] The device, system and method for realizing identity authentication provided by the present invention, on the basis of the existing identity authentication technology, realize the binding of the user identity and the user equipment used by the user by increasing the measurement authentication of the user equipment, which can prevent Most of the attacks on identity authentication on the network, or make it more difficult for attackers to attack; further, adding out-of-band identity authentication to block attacks on user identities on the network, further improving the security and protection of identity authentication The interests of legitimate users fundamentally solve the problems of attackers' middle attacks and connection hijac...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a device, a system, and a method for implementing ID authentication.. Based on the prior ID authentication technique, the binding of the user ID and the user equipment is implemented by means of the measurement certification or the ID authentication, or the attack to the user ID is blocked by means of the combination of the measurement certification and the ID authentication, so that the security of the ID authentication is improved, the benefit of the authorized user is protected and the problems of man-in-the-middle attack and session hijack are solved. Furthermore, the ID authentication system is compatible to various prior ID authentication systems, works without needing to modify the prior ID authentication system, reduces the investment cost, facilitates the management and maintenance, and greatly improves the security of the ID authentication system.

Description

technical field [0001] The invention relates to authentication technology, in particular to a device, system and method for realizing identity authentication. Background technique [0002] At present, with the rapid development of Internet technology, online transactions have penetrated into people's daily life and work, among which the applications of "online banking" and "e-commerce" are the most representative applications. For example, "online banking" is a brand-new bank customer service submission channel. Customers can handle various banking services including inquiry, transfer, payment, etc. through the Internet no matter they are at home, in the office, or on the road, and manage themselves. asset. [0003] However, while Internet technology has brought great convenience to people, the security issues of the Internet have also become increasingly prominent. For example, for online banking, when customers conduct transactions through the Internet, the customer's use...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L9/36
Inventor 刘宏伟王四军姚俊武
Owner POTEVIO INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products