Multi-layer data mapping authentication system

An authentication system, multi-layer technology, applied in the field of identity authentication system, can solve the problem of reducing the probability of real identity code being stolen, stealing card friends, etc.

Inactive Publication Date: 2010-07-07
田种楠
View PDF0 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] Because the card reader must input the real identity code, before the real identity code is transmitted to the real identity authentication server, it will go through the Internet or an unsafe communication path, and any non-authenticated third party may be in the Internet or unsafe communication. Stealing the real identification code of card users in the path
Therefore, although the use of dynamic passwords can reduce the chance of real ID being stolen, there is still room for improvement

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-layer data mapping authentication system
  • Multi-layer data mapping authentication system
  • Multi-layer data mapping authentication system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] see figure 1 Shown is the first preferred embodiment of the multi-layer data mapping authentication system of the present invention, which includes a real identity authentication server, an intermediary data mapping server and a terminal data mapping server. Wherein the intermediary data mapping server is connected to the real identity authentication server and the terminal data mapping server.

[0026] The real identity authentication server is connected to the private network domain, and further includes at least one real identity database and a built-in third conversion program. In this embodiment, the real identity authentication server further includes a hidden code database for storing a plurality of hidden codes, and each hidden code corresponds to a unique real identity database.

[0027] In the first preferred embodiment, the intermediary data mapping server is connected to the real identity authentication server and has a built-in second conversion program. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A multi-layer data mapping authentication system has a real ID authentication server, a middle data mapping server and a terminal data mapping server. The real ID authentication server links to a private network and stores real IDs and the hidden codes, each of which corresponds to a unique real ID. The terminal data mapping server links to a public network and allows an end user to link so that the end user sends the terminal data mapping server a user's code and an one-time-password (OTP). Since the middle data mapping server links between the real ID authentication server and the terminal data mapping server, the end user only uses hidden code to generate the OTP and sends the user's code and the OTP to the public network. The terminal and middle data mapping servers are converts the user's code to the corresponding real ID of the end user in the private network to complete the authentication procedure. The real ID and hidden code is not sent at the public network and is not stolen.

Description

technical field [0001] The invention relates to an identity authentication system, in particular to a multi-layer data mapping authentication system which improves the safety of online authentication. Background technique [0002] With the advent of the era of online transactions, the security of online transaction payments is becoming increasingly important. Consumers also relatively require a higher level of security transactions when paying for transactions to ensure that their private cash flow passwords will not be leaked or stolen. At present, the most commonly used technology for online cash flow authentication is dynamic password (one timepassword; OTP). [0003] The main reason why dynamic passwords are favored is that they increase the difficulty of accessing restricted resources (such as computer accounts) without authentication. Currently, there are three types of dynamic passwords. The first is to use the previous dynamic password to generate a new dynamic pas...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06K7/00
CPCH04L63/0853
Inventor 田种楠
Owner 田种楠
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products