Network real name authentication system and method based on certificate chain technology

A real-name authentication and network technology, which is applied in the field of network real-name authentication of certificate chain technology, can solve problems such as low security, threats, and limited use of application scenarios, and achieve the effect of improving security and reliability

Pending Publication Date: 2019-01-22
GLOBAL PRESTIGE INFORMATION TECH CO LTD
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] In the era of network information, the rapid development of information technology has brought great convenience to our lives. We can obtain more and more services online. The Internet provides people with convenient, efficient and reliable platform services; but the network Extensive application has also caused many problems. Online personal information leakage, network fraud, and theft have brought threats and anxiety to our lives; the lack or imperfection of laws and systems for network information management has caused the proliferation of cybercriminals; For network information management, relevant departments have proposed network real-name certification to ensure the uniqueness of citizens' network identities and to manage network identities more securely.
[0003] The currently widely used network real-name authentication methods include: "user account + password" method, "name + ID number" method, mobile phone SMS dynamic verification code method, uploading front and back photos of ID card and other identity authentication methods, but these methods It is impossible to verify the identity of the identity information and the certificate holder, making the identity information easy to be stolen, and it is impossible to realize the true mapping between the network identity and the user's real identity
[0004] With the emergence of the "swipe face + eID" authentication method, the consistency of witnesses and witnesses has been achieved, which provides a more secure method for network real-name authentication; however, the tracking of verification records is very important for network real-name authentication, which is beneficial to justice Identification and detection of network cases, this method does not have real-time tracking of verification records and real-time presentation of verification results, resulting in limited use of application scenarios and low security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network real name authentication system and method based on certificate chain technology
  • Network real name authentication system and method based on certificate chain technology
  • Network real name authentication system and method based on certificate chain technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] Such as Figure 1 to Figure 4 As shown, the present invention provides a network real-name authentication system based on certificate chain technology, including: a network real-name authentication terminal 1, a network real-name authentication server 2, an identity verification server 3, and a certificate verification server 4;

[0040] The network real-name authentication terminal 1 is specifically a hand-held mobile operation terminal, the main body is composed of a housing 5, the front of the housing 5 is provided with an LCD display 6, a keyboard 7 and a camera 8, and the side of the housing 5 is externally mounted. There is a portable scanner 9, and the bottom of the casing 5 is also provided with a port of a printer 10;

[0041] The inside of the housing 5 is provided with a control circuit board, the control circuit board is integrated with a central controller 11, and the central controller 11 communicates with the LCD display screen 6, the keyboard 7, the came...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a network real name authentication system and a network real name authentication method based on the certificate chain technology, belonging to the network real name authentication technical field of the certificate chain technology. The technical problems to be solved are: providing a network real name authentication system and method based on certificate chain technology. The technical solutions to the technical problems are as follows: a network real name authentication terminal, a network real name authentication server, an identity authentication server and a certificate authentication server. The network real name authentication terminal is particularly a hand-held mobile operation terminal, and the main body is composed of a housing, wherein an LCD display screen, a keyboard and a camera are arranged on the front side of the housing, a portable scanner is hung on the side of the housing, and a printer port is also arranged on the bottom of the housing. The casing is internally provided with a control circuit board, and the control circuit board is integrated with a central controller, which is respectively connected with an LCD display screen, a keyboard, a camera, a portable scanner and a printer through wires. The invention is applied to the certificate chain network real name authentication field.

Description

technical field [0001] The invention provides a network real-name authentication system and method based on certificate chain technology, and belongs to the technical field of network real-name authentication of certificate chain technology. Background technique [0002] In the era of network information, the rapid development of information technology has brought great convenience to our lives. We can obtain more and more services online. The Internet provides people with convenient, efficient and reliable platform services; but the network Extensive application has also caused many problems. Online personal information leakage, network fraud, and theft have brought threats and anxiety to our lives; the lack or imperfection of laws and systems for network information management has caused the proliferation of cybercriminals; For network information management, relevant departments have proposed network real-name certification to ensure the uniqueness of citizens' network id...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32H04L9/08
CPCH04L9/0866H04L9/321H04L9/3231H04L63/0815H04L63/0823H04L63/0876
Inventor 李俊张琴
Owner GLOBAL PRESTIGE INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products