Anti-tracking method in network electronic identity authentication process based on challenge modes

An electronic identity and electronic identity identification technology, which is applied in the field of anti-tracking in the process of realizing network electronic identity authentication based on the challenge method, can solve the problems of easy exposure of personal identity privacy, no internal correlation of personal identity, easy to be stolen or abused, etc. Achieve the effect of avoiding easy leakage, simple structure, and improving safety and reliability

Active Publication Date: 2015-05-06
THE THIRD RES INST OF MIN OF PUBLIC SECURITY
View PDF5 Cites 29 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] (1) User-defined user names (generally in the form of mixed letters and numbers), e-mail addresses (in the form of xxxxx.xxx), etc., which are not inherently rela

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anti-tracking method in network electronic identity authentication process based on challenge modes
  • Anti-tracking method in network electronic identity authentication process based on challenge modes
  • Anti-tracking method in network electronic identity authentication process based on challenge modes

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] In order to describe the technical content of the present invention more clearly, further description will be given below in conjunction with specific embodiments.

[0047] Such as figure 1 As shown, in one embodiment, the method for implementing anti-tracking in the network electronic identity authentication process based on a challenge includes a network electronic identity identification carrier, a client, a network application, and a network electronic identity authentication server, and includes the following steps:

[0048] (1) The network application sends a network application request to the network electronic identity carrier through the client;

[0049] (2) The network electronic identity carrier encrypts the data requested by the network application and generates a network application user identity;

[0050] (3) The network electronic identity carrier sends the network application user identity to the network application through the client;

[0051] (4) The...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an anti-tracking method in a network electronic identity authentication process based on challenge modes. The anti-tracking method includes that a network electronic identity label carrier encrypts data of network application requests, generates a network application user identity label and transmits the network application user identity label to network application; the network electronic identity label carrier performs digital signature on data to be signed of an acquired digital signature request to obtain corresponding signature results; the network electronic identity label carrier transmits the signature results; the network application combines its application label, the network application user identity label, the data to be signed and the signature results into the user identity authentication request, and the user identity authentication request is transmitted to a network electronic identity authentication server; the network electronic identity authentication server can perform identity authentication. By the anti-tracking method, dual purposes for effectively managing the network identity and sufficiently protecting privacy are achieved, safety and reliability in identity authentication are improved, and the anti-tracking method has wider application range.

Description

technical field [0001] The invention relates to the technical field of identity management and information security, in particular to identity authentication management technology in the Internet network environment, and specifically refers to a challenge-based method for realizing anti-tracking in the process of network electronic identity authentication. Background technique [0002] With the rapid development of Internet infrastructure and applications in countries around the world, the development and operation of societies in various countries have been inseparable from the Internet, and their dependence on information networks is increasing. According to the 28th statistical survey report released by CNNIC in July 2011, as of the end of June 2011, the number of Internet users in my country reached 485 million, ranking first in the world, and the penetration rate reached 36.2%, exceeding the global average. More and more problems in the real society will be reflected in...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/08
Inventor 胡永涛胥怡心梁皓
Owner THE THIRD RES INST OF MIN OF PUBLIC SECURITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products