user identification system

A user identification and user technology, applied in the field of information security, can solve the problems of weak security of identity authentication methods, loss of user names and passwords, inconvenience, etc., to achieve security and identity authentication methods, lower technical thresholds, and easy installation and use Effect

Inactive Publication Date: 2011-12-14
JURONG SHENGSHI SOFTWARE
View PDF0 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The "username + password" identity authentication method currently used by many application systems has very weak security, and the user name and password are easy to be stolen and

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] Below in conjunction with specific embodiment, further illustrate the present invention, should be understood that these embodiments are only used to illustrate the present invention and are not intended to limit the scope of the present invention, after having read the present invention, those skilled in the art will understand various equivalent forms of the present invention All modifications fall within the scope defined by the appended claims of the present application.

[0018] The present invention comprises the steps:

[0019] (1) The user enters the user name and password, and inserts the USB KEY, the client sends an authentication request to the authentication server, and automatically sends the user name, password and digital certificate stored in the USB KEY to the authentication server;

[0020] (2) After the authentication server receives the authentication request, it first compares the received user name and password with the correct information stored i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a user identification system, comprising the following steps: the user inserts a USB KEY, the client sends an authentication request to the authentication server; the authentication server receives the request and generates a random character string X; the authentication server sends X to the client ; The client uses the first algorithm to calculate the information + X in the USB KEY, and the calculation result is Rh; the client sends Rh to the authentication server; the authentication server uses the first algorithm to store the information + X in the user's USB KEY The operation result is Rh1; the authentication server compares Rh and Rh1, and if they are consistent, the verification is successful; the comparison result is sent to the application server, and the application server judges whether the user can log in according to the comparison result. The invention eliminates the system security problem caused by the traditional login mode of "user name + password", and ensures the security and accuracy of identity authentication.

Description

technical field [0001] The invention relates to the field of information security, in particular to a user identification system. Background technique [0002] With the continuous development of the Internet and information technology, information exchange through the network is undoubtedly a more economical and effective way of working. Its application provides enterprises and customers with more economical, efficient and better-service office space. While people are using the network, they begin to pay close attention to the security of information, and more and more network security requirements are presented. The "username + password" identity authentication method currently used by many application systems has very weak security, and the user name and password are easy to be stolen and cause losses; moreover, the "username + password" authentication method is also very inconvenient for users to use. , users often need to remember complex usernames and passwords. Cont...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L29/06
Inventor 田少鹏
Owner JURONG SHENGSHI SOFTWARE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products