User real information security certification system and method

A technology of information security and user information, which is applied in the field of user real information security authentication system, can solve the problems that it is difficult to avoid punching cards and shifts, high cost, and poor scalability

Inactive Publication Date: 2017-10-24
SOUTH CHINA UNIV OF TECH
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, its disadvantages are also obvious. The scalability is too poor. On the one hand, students must go to the designated place to complete the sign-in. On the other hand, the fingerprints need to be clean.
Other sign-in methods, such as rainbow sign-in and face recognition sign-i

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User real information security certification system and method
  • User real information security certification system and method
  • User real information security certification system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0055] The invention discloses a user real information security authentication system, such as figure 1 , including user hosts, wireless routers, switches and servers, such as figure 2 As shown, it is mainly composed of an infrastructure layer, a control layer and an application layer; it is characterized in that the infrastructure layer includes a wireless router and a switch, and is used for data forwarding; the control layer includes an SDN controller in a server, a user An information authentication module and an information storage system are used to process data; the application layer includes web applications and applications running on user hosts, which are used to display data; wherein:

[0056] The user host is connected to the wireless router through the wireless network, and is used to send a DHCP packet to the wireless router to request the DHCP server in the wireless router to assign a legal IP address; it is used to receive the RA notification forwarded by the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a user real information security certification system and method, and the system mainly consists of an infrastructure layer, a control layer, and an application layer. The system comprises a user host, a wireless router, a switcher, and a server. The infrastructure layer comprises the wireless router and the switcher. The control layer comprises a user information certification module and an information storage system in the server. The application layer comprises a web application. According to the invention, the method comprises the steps: verifying the validity of an IP address of the user host, and preventing the IP address of the user host from being forged; transmitting a user data package sent by the user host to the server for certification under the condition that the IP address of the user host is verified to be valid; notifying the switcher to allow the flow of the user host transmitting the user data package after the certification is successful, or else notifying the switcher to prevent the flow of the user host transmitting the user data package. The system and method can completely guarantee the authenticity of a user, and simplify the operation of user certification while improving the expandability of the certification system.

Description

technical field [0001] The invention relates to computer network technology, in particular to a system and method for user real information security authentication. Background technique [0002] At present, according to relevant media reports, college students’ paid substitute sign-in has developed into an industrial chain, and public courses have become the hardest hit area for class substitutes, and they can also substitute classes around the clock, and can deal with all kinds of tricky teachers. Most of the substitutes are students. With the increase of demand, substitutes have gradually developed into a gray industrial chain on campus. [0003] Now the widely used sign-in methods mainly include class point-in sign-in, fingerprint sign-in, and punch-in sign-in. It is time-consuming and energy-intensive to sign in at class, and the efficiency is the lowest, and it cannot solve the problem of signing on behalf of others. The efficiency of check-in has been improved to a c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/08H04L63/0815H04L63/0861H04L67/02
Inventor 张凌万选亮
Owner SOUTH CHINA UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products