Method and system for realizing network identity authentication based on two pieces of isolation equipment

A network identity and device isolation technology, applied in the field of secure transactions, can solve problems such as poor user experience, limited storage capacity, hardware cost barriers, etc.

Inactive Publication Date: 2011-09-21
BEIJING SOFTLUMOS TECH
View PDF2 Cites 26 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, limited storage capacity, customer service costs, poor user experience, and hardware costs undoubtedly hinder USB Key certificates from becoming a general solution

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for realizing network identity authentication based on two pieces of isolation equipment
  • Method and system for realizing network identity authentication based on two pieces of isolation equipment
  • Method and system for realizing network identity authentication based on two pieces of isolation equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031]To facilitate an understanding of the principles and features of the present invention, the following description refers to the implementation of an exemplary embodiment. Specifically, the present invention is aimed at installing Windows 2000 and above operating systems, IE browsers and computers that can access the Internet as ordinary clients, and installing Windows Mobile operating systems that can access Internet smart phones as authentication clients terminal, and an ordinary server connected to the Internet as the server. In addition, the present invention is combined with the PKI public key infrastructure system, and is illustrated for online banking services.

[0032] It should be understood, however, that this is not the only embodiment in which the invention may be practiced. On the contrary, the present invention can be applied to various operating systems, such as Linux, Android, Symbian, Mac OS, Chromc OS operating systems, etc.; can be applied to different ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method and system for realizing network identity authentication based on two pieces of isolation equipment. One piece of network computing equipment used in the network identity authentication process is increased to two pieces of physically-isolated network computing equipment, and each piece of network computing equipment does not process all identity authentication information, so that the Internet log-on and transaction activity security of a user is promoted. In a typical application of the method and the system, on the basis of the characteristic that a mobile phone is highly bound with the user, the same function of a special hardware key device is realized by using the mobile phone, the mobile phone becomes a general digital signature terminal, and the user can safely complete log-on and transaction activities by using a public computer, so that user experience is enhanced greatly, a PKI (Public Key Infrastructure) certificate system is easier to implement, and a general safe resolution is provided for network identity authentication based on a PKI/CA (Public Key Infrastructure/Certification Authority) structure.

Description

technical field [0001] The present invention generally relates to enabling secure transactions over a network through credentials, such as PKI certificates. More specifically, the present invention relates to a method and system for enhancing the security of digital certificates for network identity authentication. Background technique [0002] With the advent of the Internet, the number of online transactions has also increased dramatically. As such transactions increase, so do issues such as transaction security, authentication of transaction parties, non-repudiation of transactions, and authentication and verification of devices used in such transactions. In response to these problems, a public key infrastructure (PKI) has been developed in which a certification authority (CA) issues a digital certificate and a pair of associated keys to individuals and organizations participating in electronic commerce through an open network such as the Internet. These certificates ar...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 冯伟张勇
Owner BEIJING SOFTLUMOS TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products