Network user identity verification and authentication system and verification and authentication method
An identity verification, network user technology, applied in the direction of user identity/authority verification, transmission system, data processing application, etc., can solve the problems of low security, difficult authentication, waste of resources, etc., to achieve high security, convenient real-time distribution , the effect of increasing safety
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0053] Please refer to 2, which is a schematic diagram of the principle structure of the identity verification and authentication system for users of this application. It includes several processing platforms 21 and several authentication centers 22 . The processing platform 21 and the authentication center 22 may be connected through a network or a dedicated line. In this example, the verification and authentication of the user's identity is completed through a special authentication center 22 , that is, the transaction of authentication and verification is separated from the processing platform 21 . Moreover, the authentication center 22 can realize resource sharing, and compose the authentication information database 23 with authenticated information. The authentication information database 23 can use the code on the business license of the enterprise as the key to store the corresponding authentication records, and can also use the personal ID number as the key to store t...
Embodiment 2
[0075] Compared with Embodiment 1, the database 31 further includes a distribution ratio storage unit 312 for storing the distribution ratio of the certification center. The distribution ratio storage unit 312 may also be set in the certification center storage unit 311 . The distribution ratio can be modified once in a period of time (for example, a quarter, etc.). For example, a quarterly processing platform evaluates each certification center once, and resets the corresponding distribution ratio according to the quality of the certification.
[0076] In addition, the automatic distribution processing unit of this example is used to automatically distribute the user information that needs to be verified to different authentication centers according to the distribution ratio of the authentication center:
[0077] A1: Calculate the number of pre-certification required by each certification center, Q 1 =Q 总 *K 1 , Q 2 =Q 总 *K 2 ...Q N =Q 总 *K N , where K 1 、K 2 、......
Embodiment 3
[0092] Compared with Example 2, for users to perform identity verification and authentication, this example divides users into new users and renewal users. New users refer to submitting registration applications on the processing platform for the first time, and have never been authenticated by the authentication center. , the renewal user refers to the user who is already a member of the processing platform and has passed the identity verification authentication of the authentication center. Due to the expiration of the identity verification authentication validity period, the user needs to undergo identity verification authentication again. After obtaining the user who needs identity verification and authentication, compare it with the user in the user information storage unit 314 through authentication, if there is the same, then consider that the user is a renewed user, otherwise it is a new user.
[0093] The server 32 also includes a splitting unit 323: splitting the user...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 