Method for authenticating user identity through P2P service request

A technology for user identity authentication and service request, which is applied to electrical components, transmission systems, etc., can solve problems such as storage and revocation troubles, and achieve a high safety factor

Inactive Publication Date: 2010-04-21
ZHEJIANG UNIV
View PDF0 Cites 37 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this authentication method requires a trusted third-party authentication center, and the issuance, storage, and revocation of user certificates are also troublesome.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for authenticating user identity through P2P service request
  • Method for authenticating user identity through P2P service request
  • Method for authenticating user identity through P2P service request

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] The specific implementation process of the P2P network authentication method proposed by the present invention will be further described below in conjunction with the accompanying drawings.

[0049] The framework of the entire P2P network is composed of registration server, authentication server, index server and common users in the Internet. The registration server is used to register new users, the authentication server is used to authenticate users, and the index server provides resource search services for users. The user finds the target user through the index server, and then establishes a connection with it and performs data transmission.

[0050] User registration: figure 1 The process of registering a new user with a registration server. Assuming that user A wants to join the P2P network and obtain services, he first needs to register with the registration server, including the following steps:

[0051] 1) User A submits his username (ID A ) and password (P...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method for authenticating user identity through P2P service request. The prior P2P network authentication mode has certain limitations. The method for authenticating user identity comprises steps of: user registration, namely, a user obtains a legal account number after submitting a registration request to a server, and the user can log in a P2P network to acquire services by using the account number; login authentication, namely, the user inputs a user name and a password on a host computer provided with client software to log in an authentication server and perform identity authentication, and the login authentication comprises local login and server authentication; and service request authentication, namely, the user receiving a resource service request from the P2P network queries the authentication server to authenticate the identity of the user sending the request. The method adopts dual authentication in the process of the user identity authentication, so the safety factor is higher, and the same account number can be prevented from being logged in by a plurality of users at the same time; besides, the authentication server has no need of saving the password of the user, so the account number and the password of the user cannot be given away.

Description

technical field [0001] The invention belongs to the field of communication networks, in particular to an identity authentication method for a service requesting user in a P2P (Peer-to-Peer) network structure. Background technique [0002] P2P, that is, Peer-to-Peer, Peer has meanings such as "peer, peer, partner" in English, so P2P network is also called peer-to-peer network, and nodes in P2P network can conveniently exchange resources and services shared. P2P technology has become a hotspot in the research and application of the current computer network field. It breaks the traditional C / S mode and embodies the "peer-to-peer" nature of the network. Each node in the network is free to join and exit the network, and they provide services for others while obtaining services. P2P technology has been widely used in many fields such as file sharing, instant messaging, streaming media service, etc. According to a survey, more than 50% of Internet traffic comes from various appli...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
Inventor 陈惠芳谢磊陈高翔沈佳峰
Owner ZHEJIANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products