Identification authentication system and method through third-party

A technology for identity authentication and authentication information, applied in the field of identity authentication systems, can solve the problems of cumbersome, error-prone, low security, and achieve the effects of small workload, good security, and various implementation methods.

Inactive Publication Date: 2009-05-27
任少华
View PDF2 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But in this way, other communication terminals of the user (such as: QQ) cannot automatically identify the authentication information and thus acti

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identification authentication system and method through third-party
  • Identification authentication system and method through third-party
  • Identification authentication system and method through third-party

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0047] figure 1 It is the information transfer path diagram of Embodiment 1. For the network structure of this embodiment, please refer to Image 6 .

[0048] The closed transfer information in Embodiment 1 is the same authentication information and the start point and end point of the closed transfer are the same. In this embodiment, the requester is a user network terminal, the server is a network resource, the third party is an authentication service system that provides third-party identity authentication services on the Internet, and the authentication information is a random number.

[0049] Embodiment 1 comprises the following steps:

[0050] 1) The user network terminal passes the identity authentication of the authentication service system;

[0051] 2) The user network terminal requests a service from the network resource;

[0052] 3) The network resource generates a random number and a time stamp;

[0053] 4) The network resource sends the random number, the net...

Embodiment 2

[0067] figure 2 It is the information transmission path diagram of embodiment 2, the network structure of this embodiment please refer to Image 6 .

[0068] The closed transfer information in Embodiment 2 is the same authentication information and the start point and end point of the closed transfer are different. In this embodiment, the requester is a user network terminal, the server is a network resource, the third party is an authentication service system that provides third-party identity authentication services on the Internet, and the authentication information is a random sequence.

[0069] Embodiment 2 comprises the following steps:

[0070] 1) The user network terminal passes the identity authentication of the authentication service system;

[0071] 2) The user network terminal generates a random sequence;

[0072] 3) The user network terminal sends the user name and random sequence to the network resource and requests authentication, and at the same time, the ...

Embodiment 3

[0084] image 3 It is the information transmission path diagram of embodiment 3, the network structure of this embodiment please refer to Image 6 .

[0085] In Embodiment 3, the closed transfer information includes authentication generation information generated based on the authentication information, and the start point and end point of the closed transfer are different. In this embodiment, the requester is a user network terminal, the server is a network resource, the third party is an authentication service system that provides third-party identity authentication services on the Internet, and the authentication information is a random sequence, or a mathematical algorithm, or an algorithm Parameters, the user network terminal generates the information that needs to be sent by its own side in the closed transmission according to the authentication information and the information agreed with the authentication service system.

[0086] Embodiment 3 comprises the following ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a system and a method for authenticating the ID through a third party, so as to solve the problem that an internet user transmits an authentication document to a network service supplier after passing ID authentication of the third party. The system and the method transmit the authentication document of the third party on a requesting party to the service supplier by the mode of closing transmission originating from information authentication, and the service supplier judges whether the authentication passes or not by comparing whether received information is matched. The proposal has the advantages of various realization means, small working load on the service supplier, simple programs and easy realization.

Description

technical field [0001] The invention relates to a third-party identity authentication system and method. Background technique [0002] The number of resources and services provided by the Internet is huge and growing rapidly. The Internet has become the main channel for people to obtain information resources and information services. Many online resources and services require users to log in and verify, which causes some problems. First of all, each network resource uses different login information, which is difficult to remember due to the variety of login information. Secondly, the simple method of user name and password also has the problem of low security, which cannot meet the needs of many online applications. Some resources and services that are important to users, such as online game accounts, e-commerce accounts, etc., often face the problem of insufficient online security. [0003] The third-party certification method is an effective way to solve the above proble...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/32
Inventor 任少华
Owner 任少华
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products