Unlock instant, AI-driven research and patent intelligence for your innovation.

Distributed user authentication system and method

A user authentication and distributed technology, applied in transmission systems, special data processing applications, instruments, etc., can solve the problems of network service shutdown, website unable to perform user authentication, weak user data security, etc., to achieve the effect of improving security.

Inactive Publication Date: 2013-11-27
INVENTEC CORP
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, once this shared database is damaged, its website will not be able to perform user authentication, and even cause the network services provided to stop, so user data has a problem of weak security
[0005] To sum up, it can be seen that there has been a problem of weak user data security in the existing technology for a long time, so it is necessary to propose improved technical means to solve this problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Distributed user authentication system and method
  • Distributed user authentication system and method
  • Distributed user authentication system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] The implementation of the present invention will be described in detail below in conjunction with the drawings and examples, so that the realization process of how to use technical means to solve technical problems and achieve technical effects in the present invention can be fully understood and implemented accordingly.

[0028] Before explaining the distributed user authentication system and method provided by the present invention, the terms defined in the present invention will be described first. The login information, the first authentication information and the second authentication information mentioned in the present invention refer to the user account number and the user password. In the first server, the second authentication information is pre-set in the second server. In other words, after the user registers in the first server in advance, the first server stores the corresponding first authentication information set by the user , if the user registers in t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to distributed user authentication system and method. Logon information is transmitted to a first server through a client and used for being compared with first authentication information; and the logon information is transmitted to a second server when not conforming to the first authentication information during comparison and used for being compared with second authentication information so as to judge whether the client is permitted to log in the first server or not. The invention achieves the technical efficacy of enhancing the safety of user data in a way of dispersedly storing the user data.

Description

technical field [0001] The present invention relates to a user authentication system and its method, in particular to a distributed user authentication system and method that compares login information with authentication information scattered in different servers to allow a client to log into the server. Background technique [0002] In recent years, with the vigorous development of network technology, various network-based application services have sprung up. However, some network services are limited to specific users. Therefore, in order to verify the identity of users in the network Authentication usually provides a login webpage to prompt the user to enter the account number and password, so as to identify the user's identity according to the account number and password entered by the user. [0003] Generally speaking, the account number and password entered by the user are preset, that is to say, the user registers with the server in advance to create a custom account...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/12G06F17/30
Inventor 邱全成赵九英
Owner INVENTEC CORP