Method and system for implementing network authentication

A network authentication and network technology, applied in the field of authentication, can solve the problems of easy loss, additional carrying of smart cards, poor convenience, etc., and achieve the effect of preventing attacks

Active Publication Date: 2009-06-24
BEIJING HUADA ZHIBAO ELECTRONICS SYST
View PDF0 Cites 38 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of this, the object of the present invention is to provide a method and system for realizing network authentication, which is used to solve the problems that the current smart card needs to be carried extra when performing network authentication, which brings about poor convenience and easy loss

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for implementing network authentication
  • Method and system for implementing network authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0016] The embodiment of the present invention adopts smart card technology, uses the mobile terminal, which is widely used nowadays, as the carrier of the smart card, and uses the mobile phone to replace the traditional smart password key as the authentication medium to realize safe and convenient network authentication. The present invention changes the disadvantages of the existing users who must carry an additional smart password key for network authentication. At the same time, the mobile phone keyboard can be used to input data and display it on the display screen, effectively preventing man-in-the-middle attacks in the authentication process, and improving authentication security. With a more reliable guarantee.

[0017] In order to make the objectives, technical solutions and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0018] figure 1 It is a system structure...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for realizing the network authentication. The method comprises the following steps: connecting an intelligent card with business data and a key with a mobile phone; connecting the mobile phone with an authentication terminal performing a transaction; executing the authentication through the mobile phone and the intelligent card by the authentication terminal; and performing the transaction after the authentication is passed. The invention further discloses a system for realizing network authentication, adopts the intelligent card and the mobile phone to replace traditional intelligent code key as an authentication medium, so as to realize safe and convenient network authentication, and meanwhile the code keyboard uses functions of a display screen and a keyboard of the mobile phone and the like to realize a high-end intelligent code key form.

Description

Technical field [0001] The invention relates to authentication technology, in particular to a method and system for realizing network authentication. Background technique [0002] As an IC card with functions of identification, payment, encryption / decryption, etc., smart card has the characteristics of fast operation, large storage capacity, and high security due to the combination of more advanced integrated circuit chips, and has been widely used in banks, In the fields of telecommunications, social insurance, and e-commerce, providing reliable guarantees for safe transactions is the development trend of future cards. [0003] At present, the domestic use of smart cards to achieve network authentication mainly adopts the form of smart cryptographic keys, and smart cards are built in the smart cryptographic keys to achieve the safe storage of digital certificates and keys. The smart password key is a network electronic identity authentication device that does not require a card ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G07F7/08H04M1/725H04M1/72403
Inventor 夏皓如陈跃翟群峰刘海剑广忠海华燕翔
Owner BEIJING HUADA ZHIBAO ELECTRONICS SYST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products