Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network real-name authentication method and system

A real-name authentication and authentication system technology, applied in the field of network communication, can solve problems such as non-compliance, guarantees and restrictions, and failure to implement network management responsibilities, so as to avoid resource waste and improve accuracy and security.

Inactive Publication Date: 2018-03-16
解芳
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The above two authentication methods do not belong to network real-name authentication, and at least have the following defects: First, they do not meet the relevant requirements of the Ministry of Public Security Order No. 82, and cannot conduct behavioral audits on users' network operations. After information security incidents occur, network management responsibilities cannot be implemented. , will result in an incomplete chain of judicial evidence; second, non-real-name authentication cannot identify the identity of network users, cannot provide users with differentiated network services such as network bandwidth guarantees and restrictions, network access policy restrictions, and cannot satisfy different levels of user networks. need
[0004] It can be seen that none of the above-mentioned existing technologies can meet the government's network real-name authentication requirements, and cannot conduct behavioral audits on users' network operations. As a result, network management responsibilities cannot be implemented after information security incidents occur.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network real-name authentication method and system
  • Network real-name authentication method and system
  • Network real-name authentication method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in combination with specific embodiments and with reference to the accompanying drawings. It should be understood that these descriptions are exemplary only, and are not intended to limit the scope of the present invention. Also, in the following description, descriptions of well-known structures and techniques are omitted to avoid unnecessarily obscuring the concept of the present invention.

[0028] In the prior art, the network authentication methods of the public wireless network generally include network fixed password authentication methods and short message password authentication methods.

[0029]The network fixed password authentication method is suitable for small and medium-sized public places such as cafes and restaurants. It is the simplest and most convenient authentication method. Generally, the p...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method and a system of network real name authentication. The method comprises the following steps that: a user is connected to a wireless network; a network access permission before authentication is distributed for the user; the user visits a Portal server; the Portal server transmits the authentication information to a third-party authentication system to authenticate; the third-party authentication system returns an authentication result; the Portal server determines user grouping information according to the authentication result; and an RADIUS (Remote Authentication Dial In User Service) authentication server is transferred to open an account to the user. Through the method and the system which are provided by the invention, the unified real name authentication can be implemented to be greatly beneficial for improving accuracy and safety of real name authentication; meanwhile, the existing resources are fully utilized to avoid wasting of resources.

Description

technical field [0001] The present invention relates to the technology in the field of network communication, and relates to a network real-name authentication method and system, in particular, to a method and system for realizing network real-name authentication through a third-party authentication platform. Background technique [0002] At present, restaurants, coffee shops, shopping malls, hotels and other large public places provide free wireless Internet access services to the public. Usually, the network authentication methods of the public wireless network include fixed password authentication and SMS authentication. The fixed password authentication method means that all users share a password, and the user only needs to enter the common password after searching for the wireless network signal to realize networking; the SMS authentication method means that the user enters the mobile phone number, and the network password is sent to the user's mobile phone by SMS The...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32
Inventor 解芳
Owner 解芳
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products