Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Security network authentication system and method

A network authentication and security technology, applied in the field of secure network authentication system, to achieve the effect of reliable authentication method

Inactive Publication Date: 2013-11-06
任少华
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] In view of the deficiencies of the current third-party authentication methods mentioned above, the present invention uses an innovative third-party identity authentication system and method to solve the above-mentioned problems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security network authentication system and method
  • Security network authentication system and method
  • Security network authentication system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0057] In this embodiment, the intermediary party has a digital certificate issued by an authoritative organization, and the service party can use the digital certificate to verify the digital signature of the intermediary party. A dedicated program downloaded from the other party.

[0058]The specific steps of this embodiment are: the user runs the authentication program on the terminal, the authentication program automatically establishes an SSL connection with the intermediary, the user enters the AUID and password in the authentication program to log in, and the authentication program sends the user's AUID to the intermediary and password, the intermediary checks the user name and password, if they are correct, proceed to the following steps; otherwise, the intermediary saves the user's AUID, the SSL ID and the current system time correspondingly (the DES of the SSL stored by the user) The key is the authentication ID), when the user needs to access a resource of a server,...

Embodiment 2

[0061] In this embodiment, the intermediary party has a digital certificate issued by an authority, and the service party can use the digital certificate to verify the digital signature of the intermediary party. The user side is authenticated by the intermediary party in the form of user name and login password. The authentication program is a browser.

[0062] The specific steps of this embodiment are: the user runs a browser object on the terminal and inputs the address of the intermediary (the browser object is used as an authentication program), and the intermediary establishes a session based on an SSL connection with the browser, wherein the intermediary generates A 1024-bit random sequence is used as the SessionID of the session established with the user's browser. The user enters the AUID and password on the interface launched by the intermediary to log in. The intermediary checks the AUID and password. If they are correct, proceed to the following steps; otherwise, sto...

Embodiment 3

[0064] In this embodiment, the service party knows the fixed IP address of the intermediary in advance, and the user is authenticated by the intermediary with a user name and a login password. The authentication program is a special program downloaded by the user from the intermediary.

[0065] The specific steps of this embodiment are: the user runs the authentication program on the terminal, the authentication program establishes a session with the intermediary and the SessionID is a 1024-bit random sequence generated by the intermediary, the user enters the user name and password in the authentication program to log in, the The authentication program sends the user's user name and password to the intermediary. The intermediary checks the user name and password. If it is correct, proceed to the following steps; The AUID of the user, the SessionID of the session established by the user authentication program, and the current system time are saved correspondingly. When the user...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a security network authentication system and method. At present, the security and convenience for internet authentication can be greatly improved by third-party authentication, but the current third-party internet security authentication scheme has serious defects. Aiming at the disadvantages of the current third-party authentication mode, the invention provides the security network authentication system and method, which can solve the above problems by an innovative third-party identity authentication system and method.

Description

technical field [0001] The invention relates to a secure network authentication system and method. Background technique [0002] The number of resources and services provided by the Internet is huge and growing rapidly. The Internet has become the main channel for people to obtain information resources and information services. Many online resources and service providers require users to log in and verify, which has caused some problems. First of all, each network service provider uses different login information, and the login information is numerous and difficult to remember. Secondly, the simple method of user name and password also has the problem of low security, which cannot meet the needs of many online applications. [0003] The authentication method through a third party or an intermediary is an effective way to solve the above problems, but the existing third-party (intermediary) authentication solutions all have some defects. [0004] For example, some solutions...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32
Inventor 任少华
Owner 任少华
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products