Unlock instant, AI-driven research and patent intelligence for your innovation.

Network user identity verification and authentication system and verification and authentication method

An identity verification, network user technology, applied in the direction of user identity/authority verification, transmission system, data processing application, etc., can solve the problems of low security, difficult authentication, waste of resources, etc., to achieve high security, convenient real-time distribution , the effect of increasing safety

Active Publication Date: 2009-12-16
ALIBABA CLOUD COMPUTING LTD
View PDF0 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] The first purpose of this application is to provide a network user identity verification and authentication method to solve the technical problems of difficult authentication, waste of resources, and low security in the prior art
[0011] The second purpose of this application is to provide a network user identity verification and authentication system to solve the technical problems of difficult authentication, waste of resources, and low security in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network user identity verification and authentication system and verification and authentication method
  • Network user identity verification and authentication system and verification and authentication method
  • Network user identity verification and authentication system and verification and authentication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0053] Please refer to 2, which is a schematic diagram of the principle structure of the identity verification and authentication system for users of this application. It includes several processing platforms 21 and several authentication centers 22 . The processing platform 21 and the authentication center 22 may be connected through a network or a dedicated line. In this example, the verification and authentication of the user's identity is completed through a special authentication center 22 , that is, the transaction of authentication and verification is separated from the processing platform 21 . Moreover, the authentication center 22 can realize resource sharing, and compose the authentication information database 23 with authenticated information. The authentication information database 23 can use the code on the business license of the enterprise as the key to store the corresponding authentication records, and can also use the personal ID number as the key to store t...

Embodiment 2

[0075] Compared with Embodiment 1, the database 31 further includes a distribution ratio storage unit 312 for storing the distribution ratio of the certification center. The distribution ratio storage unit 312 may also be set in the certification center storage unit 311 . The distribution ratio can be modified once in a period of time (for example, a quarter, etc.). For example, a quarterly processing platform evaluates each certification center once, and resets the corresponding distribution ratio according to the quality of the certification.

[0076] In addition, the automatic distribution processing unit of this example is used to automatically distribute the user information that needs to be verified to different authentication centers according to the distribution ratio of the authentication center:

[0077] A1: Calculate the number of pre-certification required by each certification center, Q 1 =Q 总 *K 1 , Q 2 =Q 总 *K 2 ...Q N =Q 总 *K N , where K 1 、K 2 、......

Embodiment 3

[0092] Compared with Example 2, for users to perform identity verification and authentication, this example divides users into new users and renewal users. New users refer to submitting registration applications on the processing platform for the first time, and have never been authenticated by the authentication center. , the renewal user refers to the user who is already a member of the processing platform and has passed the identity verification authentication of the authentication center. Due to the expiration of the identity verification authentication validity period, the user needs to undergo identity verification authentication again. After obtaining the user who needs identity verification and authentication, compare it with the user in the user information storage unit 314 through authentication, if there is the same, then consider that the user is a renewed user, otherwise it is a new user.

[0093] The server 32 also includes a splitting unit 323: splitting the user...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a network user identity verification and authentication system, which comprises a processing platform and a plurality of authentication centers, wherein the processing platform is connected with the authentication centers respectively through a network or a special line; and the processing platform completes verification and authentication of identities of a plurality of users through the plurality of authentication centers. The authentication process comprises the following steps of: (1) prestoring a distribution ratio of each authentication center; (2) automatically distributing user information needing to carry out identity verification to the different authentication centers according to the distribution ratio of each authentication center; and (3) receiving authentication results returned by the authentication centers to obtain a final authentication result.

Description

technical field [0001] The application relates to an identity verification and authentication system and a verification and authentication method for network users, in particular to an identity verification and authentication system and a verification and authentication method for enterprise users. Background technique [0002] With the vigorous development of e-commerce and e-government on the Internet, online transactions have also developed rapidly due to its advantages of low transaction costs, convenience and speed, and the number of users using online transactions has also increased sharply. However, the security problem of online transactions has become increasingly prominent, and it has become a major bottleneck hindering the development of online transactions. This has caused most users to pay more attention to the safety of the entire transaction process in addition to the convenience and speed of online transactions. In particular, when important information (suc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/32G06Q30/00
Inventor 章易姚亚利许延敏蒋旭迪倪啸云席敏
Owner ALIBABA CLOUD COMPUTING LTD