Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for authenticating network identity

An authentication method and network identity technology, applied in the direction of user identity/authority verification, electrical components, transmission systems, etc., can solve the information leakage of user name, password and verification code, the relationship between user name, password and verification code is not very close, etc. problems, to achieve the effect of improving authentication security and reducing network bandwidth

Active Publication Date: 2015-05-20
北京信安世纪科技股份有限公司
View PDF5 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] At present, client-server or browser-server applications generally support the authentication method of username / password when performing identity authentication. With the continuous advancement of technology, most servers also provide image-based verification code services. The user enters the user name, password and verification code, but it may be because the verification code is added later, so the relationship between the user name, password and verification code is not very close, and the authentication mechanism of the user name and password is also different, which is easy to cause Username, password and verification code information leakage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for authenticating network identity

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific implementation examples described here are only used to explain the present invention, and are not intended to limit the present invention. In addition, the technical features involved in the various embodiments of the present invention described below can be combined with each other as long as they do not constitute a conflict with each other.

[0036] Such as figure 1 As shown, the present invention provides a network identity authentication method, comprising the following steps:

[0037] S11, the client sends an authentication request to the server;

[0038] S12, the server generates authentication information according to the authentication request, and feeds the authentication information back to the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for authenticating a network identity, comprising the following steps: a client side sends an authentication request to a server side; the server side generates authentication information according to the authentication request and feeds the authentication information back to the client side, wherein the authentication information includes dynamic instructions and an authentication interface; the client side obtains user information input by a user through the authentication interface; the client side generates an authentication password through the user information; the server side generates an authentication comparing code according to the user information; the server side compares the authentication password with the authentication comparing code; and if the authentication password is identical to the authentication comparing code, the authentication is successful. The method combines the username and the password with a password authentication of a verification code and replaces the verification code with a subscript for obtaining the authentication password, so that the risk of revealing the password and the verification code is avoided, the network bandwidth required by the authentication is reduced and the authentication safety is improved.

Description

technical field [0001] The invention belongs to the technical field of computer networks, and in particular relates to a safe network identity authentication method. Background technique [0002] All information in the computer network world, including the user's identity information, is represented by a specific set of data. Computers can only identify the user's digital identity, and all authorizations to users are also authorizations for the user's digital identity. [0003] How to ensure that the operator who operates with a digital identity is the legal owner of the digital identity, that is to say, to ensure that the physical identity of the operator corresponds to the digital identity. Identity authentication is to solve this problem and serve as the first pass to protect network assets , identity authentication plays a pivotal role. [0004] At present, client-server or browser-server applications generally support the authentication method of username / password when...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/06
Inventor 汪宗斌王珝心
Owner 北京信安世纪科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products