A method for generating and protecting real-name system network identity

A technology of network identity and network identity identification, which is applied in the field of real-name system network identity generation and protection, can solve the problem of personal privacy of users who cannot truly realize the "identity of witnesses", and achieve the effect of avoiding widespread dissemination and ensuring security.

Active Publication Date: 2018-12-21
XINGTANG TELECOMM TECH CO LTD +1
View PDF5 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] In view of the above analysis, the embodiment of the present invention aims to provide a method for generating and protecting real-name network identities, so as to solve the problem that the existing technology cannot truly realize the "identity of witnesses and certificates" and effectively protect the personal privacy of users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for generating and protecting real-name system network identity
  • A method for generating and protecting real-name system network identity
  • A method for generating and protecting real-name system network identity

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0055] Such as figure 1 As shown, a specific embodiment of the present invention discloses a method for generating and protecting a real-name network identity, including the following steps:

[0056] S1. Obtain the unique ID number and card body identification corresponding to the user's second-generation ID card by manually entering, using a card reader or NFC device, such as figure 2 shown.

[0057] S2. In the infrastructure, the ID number and the card body identification are respectively converted into a virtual form of identity identification and card body identification according to a preset algorithm, such as figure 2 shown. The infrastructure includes computers, which may include multiple computers. The preset algorithm is a data encryption algorithm agreed upon in advance by the infrastructure manufacturer and the public security. Using the existing algorithm, those skilled in the art can understand that the virtual form of the identity mark and the card body mark...

Embodiment 2

[0061] Such as image 3 As shown, optimization is carried out on the basis of the above-mentioned embodiment, and before obtaining the unique ID number corresponding to the user's second-generation ID card and the card body identification, the step S0 of verifying the user's identity is also included:

[0062] S0. Through at least one method of fingerprint recognition, portrait recognition, retinal recognition, voice recognition, and PIN code verification, or through on-site user identity verification by public security organs.

[0063] The user identity verification step S0 is generally carried out through on-site collection to ensure the identity of witnesses. The identity of the citizen identity information and the user can be effectively verified through user identity verification, so the citizen identity information (identity card information) is not easy to be fraudulently used. In addition, before logging into the Internet application, a user identity verification step...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method for generating and protecting a real-name system network identity, belonging to the technical field of information security, which solves the problem in the prior artthat the identity of a person and a witness cannot be truly realized, and the personal privacy of a user is not effectively protected. The invention discloses the method for generating and protectingthe real-name system network identity, which is based on the civic identity information of a user and the user name of a network application registered in an Internet application to carry out encryption mapping, can obtain a unique network identity mark, and realizes the identity of a person and a certificate on the Internet. Because the network identity is non-restorable, non-extrapolable, and only corresponds to a unique user, the user's identity information and use security are protected to some extent. At the same time, in the process of network transmission, the user's biometric information and citizenship information involved in the use of Internet applications are also encrypted to protect personal privacy from leakage. The invention not only facilitates the real name system of network identity, but also effectively protects personal privacy.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a method for generating and protecting real-name system network identities. Background technique [0002] Online identity refers to the online accounts registered and registered by citizens to use Internet services. Under normal circumstances, online identities are anonymous, and generally cannot be directly related to individual citizens in the real society, so it brings some hidden dangers, and illegal and criminal incidents on the Internet are not uncommon. In recent years, my country has begun to pay more and more attention to the necessary supervision of the Internet. [0003] In order to create a good Internet environment, it is necessary to implement a real-name system for online identities so that they can lock corresponding individual citizens in real society. [0004] At present, my country's Internet applications mainly adopt the following three methods ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/30
CPCH04L9/3066H04L63/0428H04L63/0815H04L63/0861H04L63/0876
Inventor 刘硕张萌蔡子凡刘瑞鹏贾东睿
Owner XINGTANG TELECOMM TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products