Trusted network identity management and verification system and method

A network identity and verification system technology, applied in user identity/authority verification, transmission systems, electrical components, etc., can solve the problem of not providing data content, data being easily hijacked or tampered with, and inability to determine message tampering and whether the source is correct, etc. question

Active Publication Date: 2015-12-16
CHINA INTERNET NETWORK INFORMATION CENTER
View PDF4 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The original protocol of DNS is a lightweight protocol, which cannot provide security guarantee for service data content; moreover, DNS data is transmitted in clear text on the Internet, and the data is easily hijacked or tampered with during transmission.
Since the DNS protocol itself does not provide an integrity protection mechanism for data content, the receiver cannot tell whether the received message has been tampered with or whether the source is correct; in addition, the implementation of the DNS protocol is usually based on the UDP protocol, which lacks the reliability of communication Assurance, which further heightens the possibility of messages being tampered with or falsified

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Trusted network identity management and verification system and method
  • Trusted network identity management and verification system and method
  • Trusted network identity management and verification system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] In order to make the above objects, features and advantages of the present invention more obvious and understandable, the present invention will be further described below through specific embodiments and accompanying drawings.

[0038] The present invention specifically includes five functional roles: an organization that manages user identity information, an organization that manages Internet service providers, an organization that maintains trusted identification information for users and services, Internet users, and network service providers. The above five functional roles can be realized by specific hardware devices or software modules, which can be called user identity management unit / device / module, network service management unit / device / module, trusted identity maintenance unit / device / module, Internet user unit / device / module and network service provider unit / device / module. The name "unit" is used below, such as figure 1 shown.

[0039] The user identification...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a trusted network identity management and verification system and method. The method comprises the following steps that: a user identity management unit maintains network identity information of a user, binds a network identity of the user with public key information, and registers the bound network identity and public key information to a trusted identity maintenance unit; a network service management unit manages an Internet service, binds corresponding public key information with a domain name, and registers the bound public key information and domain name to the trusted identity maintenance unit; the trusted identity maintenance unit deploys a DNSSEC (Domain Name System Security Extensions) protocol, and maintains identity and public key binding information of the user and the Internet service; an Internet user unit saves and manages private key information of the Internet user unit, and acquires information of a trusted Internet service provider by inquiring the trusted identity maintenance unit; and an Internet service provider unit saves and manages private key information of the Internet service provider unit, and acquires user information by inquiring the trusted identity maintenance unit. Through adoption of the trusted network identity management and verification system and method, functions such as bidirectional identity authentication, key negotiation and secure communication between the service provider and an Internet user can be supported.

Description

technical field [0001] The invention belongs to the field of network technology and information security technology, and in particular relates to a trusted network identity management and verification system and method. Background technique [0002] With the rapid development of information technology in the past two decades, the importance of the Internet in social production and personal life has become increasingly prominent, and its services and applications have penetrated into military, cultural, political, economic and other fields. However, with the unprecedented wide application of the Internet, the security problems it faces are becoming increasingly severe. Cases such as the "Prism Gate" incident, the "Five Eyes" intelligence alliance, and the "Angry Birds" espionage incident have continuously aroused great attention from all countries to network credibility and security. [0003] Since 2000, the United States, the European Union, Japan and other countries and re...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/06
CPCH04L9/32
Inventor 延志伟耿光刚傅瑜李晓东
Owner CHINA INTERNET NETWORK INFORMATION CENTER
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products