A method to realize a global network real name system based on ID authentication

A technology of identification authentication and global network, which is applied in the field of global network real-name system, can solve problems such as insufficient scale of management users, influence on authentication efficiency, and inability to meet technical requirements, etc.

Inactive Publication Date: 2009-10-07
胡祥义
View PDF0 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] At present, there are two types of network identity authentication technologies used by countries all over the world. One is authentication protocols established based on non-cryptographic algorithm technologies such as RADIUS, secret protection (dynamic password), etc., and the second type is authentication protocols established based on cryptographic algorithm technologies. , such as: KERBEROS, PPP, PKI and IBE, because the first type of authentication protocol does not use a cryptographic algorithm, its security performance is relatively low, and it is not suitable for establishing an international network real-name system. The second type of authentication protocol uses a cryptographic algorithm, and its security performance is relatively high. KERBEROS It is an authentication protocol based on "tickets" and established using a symmetric cryptographic algorithm. It has high security performance. However, the daily registration and management of "tickets" in KERBEROS is cumbersome, and the cost of key update and maintenance is high. PPP is an authentication protoc

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method to realize a global network real name system based on ID authentication
  • A method to realize a global network real name system based on ID authentication
  • A method to realize a global network real name system based on ID authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] The implementation steps of the international network real-name system are described below in conjunction with the accompanying drawings:

[0034] figure 1 : Explain that the implementation process of the identity authentication protocol in the network real-name system technology is as follows:

[0035] (1) An authentication request is issued by the client side;

[0036] (2) The time stamp and random number are generated by the WEB server and sent to the client, and the authentication life cycle T is calculated at the same time;

[0037] (3) After receiving the time stamp and random number, the client computer transmits it to the chip of the client-side hardware device, and selects the elements of the "key seed" table KK according to the symmetric key generation algorithm composed of time stamp and random number , select a group of symmetric key 1, use the symmetric key 1 to encrypt timestamp and random number to generate authentication password 1, and pass authentica...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A method to realize a global network real name system based on ID authentication is to classify network user identity authentication at each network into two types, establish one-to-one domestic authentication center at each website to provide authentication service for domestic network users when they logon domestic websites, establish 10-30 international authentication centers in the country to provide third-party centralized authentication service for foreign network users (from other countries or regions) when they access and logon domestic websites, adopt ID authentication means to solve the 'bottleneck' of mass authentication of authentication centers, update and maintain the network user authentication parameters of domestic authentication centers through the encrypted transmission established between the network real name system association (or society) of each country and domestic website technicians, and meanwhile update and maintain the network user authentication parameters of international authentication center of each country through encrypted transmission established between the network real name system associations (or societies) of different countries, thus realizing a global network real time system.

Description

Technical field: [0001] The present invention relates to the field of information security, and uses computer network, cipher and chip technology to establish identity authentication and digital signature protocols. Background technique: [0002] At present, there are two types of network identity authentication technologies used by countries all over the world. One is authentication protocols established based on non-cryptographic algorithm technologies such as RADIUS, secret protection (dynamic password), etc., and the second type is authentication protocols established based on cryptographic algorithm technologies. , such as: KERBEROS, PPP, PKI and IBE, because the first type of authentication protocol does not use a cryptographic algorithm, its security performance is relatively low, and it is not suitable for establishing an international network real-name system. The second type of authentication protocol uses a cryptographic algorithm, and its security performance is r...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L29/06
Inventor 胡祥义
Owner 胡祥义
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products