Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A traceability-based user information authentication method

An authentication method and technology for user information, applied in transmission systems, electrical components, etc., can solve the problems of passwords being easily peeped by others, low stability, and difficult to remember.

Active Publication Date: 2020-10-23
GLOBAL ENERGY INTERCONNECTION RES INST CO LTD +4
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Specifically, the disadvantages of the password mechanism are: the password is transmitted to the verification server in plain text, which is easy to be intercepted during the period, and the cost of password maintenance is relatively high; however, to ensure security, the password should be changed frequently, and to avoid dictionary attacks on the password , the password should have a certain length and is difficult to remember; the password is easy to be peeped by others when entering
The disadvantages of biometric technology are: the precise experimental equipment required for biometric recognition is usually more expensive, and because many biological characteristics of people will change; therefore, this method has low stability and high recognition failure rate

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A traceability-based user information authentication method
  • A traceability-based user information authentication method
  • A traceability-based user information authentication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] The specific embodiments of the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0041] Such as figure 1 As shown, a user information authentication method based on traceability, the method includes the following steps:

[0042] 1) authentication user identity; step 1) in, authentication user identity comprises, the user sends a request message to server, after server receives this message, extracts the user IP address that it contains and the negation operation rule of binary number;

[0043] Use the inversion operation rule to invert the user's IP address bit by bit, generate a dynamic password, and return the receipt to the user;

[0044] After the user obtains the dynamic password, fill in the user name and dynamic password and submit them to the server for authentication. If the authentication is successful, the user is allowed to enter the network system and go to step 2); otherwise, the login fails.

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a user information authentication method based on traceability. The user information authentication method comprises the following steps of authenticating user identity; establishing a behavior authentication set; carrying out creditability authentication on the user behavior based on the D-S evidence theory; and tracking and authenticating the user identity. The user information authentication method in the technical scheme is used for solving the identity authentication problem of network users in the internet, the method can be used for realizing dual authentication of the user identity and the user behavior, thereby not only effectively avoiding illegal users accessing the network, but also regulating the network behaviors of the users, and thus the security of the internet is greatly improved.

Description

technical field [0001] The invention relates to an authentication method, in particular to a user information authentication method based on traceability. Background technique [0002] With the continuous popularization and deepening of network information system applications, more and more attention has been paid to information security issues. In order to ensure the security of information systems, terminal security protection has become an urgent problem to be solved. [0003] As the first gate of computer and network system security, end-user authentication technology is an important technical means to confirm the identity of the operator. At present, commonly used security protection measures include issuing digital certificates to users, USB user keys, biometric features (fingerprint, iris) and other auxiliary security means to verify the authenticity of user identities and ensure the safety of users in Internet activities. [0004] In recent years, the development of...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/06H04L63/0846H04L63/0861H04L63/0876
Inventor 管小娟费稼轩时坚华晔戴造建曾荣陈璐李勇
Owner GLOBAL ENERGY INTERCONNECTION RES INST CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products