Identification authentication system and identification authentication method based on wireless access

A wireless access and identity authentication technology, applied in the field of identity authentication system, can solve problems such as user information leakage, long operation time, and potential safety hazards, and achieve the effects of expanding application fields, improving security performance, and improving convenience

Inactive Publication Date: 2016-09-21
SHANGHAI PEOPLENET SECURITY TECH
View PDF4 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] There are following problems in the above three existing general login methods: for the password-free login method, there are security risks, and user information is prone to leakage; for the static password login method, if the static password set is too simple, it is very It is easy to be cracked and not safe enough. If the static password set is too complicated, the authentication steps will be complicated, resulting in difficulty in memory, long operation time, and easy input errors; verification, inconvenience to the user
[0005] More importantly, in the above login methods, when users connect to free wireless networks in public places such as banking outlets, there are still relatively large security risks. Fishing wireless network, attracting users to connect to the fishing wireless network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identification authentication system and identification authentication method based on wireless access
  • Identification authentication system and identification authentication method based on wireless access
  • Identification authentication system and identification authentication method based on wireless access

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0069] In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the specific implementation manners of the present invention will be described below with reference to the accompanying drawings. Obviously, the accompanying drawings in the following description are only some embodiments of the present invention, and those skilled in the art can obtain other accompanying drawings based on these drawings and obtain other implementations.

[0070] Such as figure 1 Shown is the wireless access-based identity authentication system 100 provided by the present invention. It can be seen from the figure that the identity authentication system 100 includes: a wireless terminal 110 , a wireless access terminal 120 and an authentication server 130 .

[0071] Specifically, in one embodiment, as figure 2 As shown, the wireless terminal 110 connected to the wireless signal transmitted by the wireless access terminal 120 includ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an identification authentication system and an identification authentication method based on wireless access. The identification authentication system comprises a wireless terminal, a wireless access end, and an authentication server. The wireless terminal comprises an information acquisition module, which is used for acquiring user information; a first storage module of a safety plug-in. The first storage module is used to store a generated first authentication code, and the safety plug-in is provided with an operation algorithm in a built-in way. The authentication server comprises a second storage module and a first authentication module. The second storage module is used to store the safety plug-in used for generating a second authentication code, and the authentication module is used to authenticate the first authentication code based on the generated second authentication code. The wireless access end is used to realize access of wireless terminal wireless signals based on the authentication result of the authentication server. The wireless terminal is only required to complete the authentication and download the safety plug-in at the first time of logging on to the wireless network, and thereafter the wireless terminal is not required to input the user information the next time of logging on to the same wireless network, and because the automatic authentication and the connection with the wireless network are carried out by the safety plug-in, the convenience and the safety performance of the users are greatly improved.

Description

technical field [0001] The invention relates to the field of communication technology, in particular to an identity authentication system and method thereof. Background technique [0002] With the development of information technology, people rely more and more on the Internet. In order to provide convenience for customers, many public places, such as bank outlets, will provide wireless access points. [0003] The existing wireless access mechanism generally includes: 1). Password-free login, that is, no password is set in the corresponding public place, and the communication device can directly log in as long as it is connected to the wireless network in the area; 2). Static password login , that is, set a static password in the corresponding public place, and enter the static password for authentication and login after the communication setting is connected to the wireless network; 3). Log in with a mobile phone number, and send a verification code request to the authenti...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/02H04W12/06H04W12/08
CPCH04W12/02H04W12/06
Inventor 谈剑锋熊志刚李呈舜姜立稳胡剑波谢勇钱金金
Owner SHANGHAI PEOPLENET SECURITY TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products