A security network middleware for identity authentication, and a method and apparatus for implementing the same

A security network, identity authentication technology, applied in computer security devices, digital data authentication, instruments, etc., can solve problems such as user identity information theft

Active Publication Date: 2019-03-19
北京庚金科技有限公司
View PDF7 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] This application provides a secure network middleware for identity authentication and its implementation method and device to solve the problem that in the prior art, when the authentication platform collects the user's identity information through a third-party network application, the user's identity information is blocked by a third party The Problem with Web App Theft

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A security network middleware for identity authentication, and a method and apparatus for implementing the same
  • A security network middleware for identity authentication, and a method and apparatus for implementing the same
  • A security network middleware for identity authentication, and a method and apparatus for implementing the same

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0073] see figure 2 , which is a first embodiment of an implementation method of a secure network middleware for identity authentication provided by this application, the implementation method includes:

[0074] Step 201, the middleware receives the user identity information sent by the client, and sends an authentication signal for verifying the authentication platform to the authentication platform;

[0075] Specifically, when the middleware receives the user identity information sent by the client, it first needs to verify the identity of the authentication platform to verify whether the authentication platform is a real platform for verifying user identity information. The platform can ensure secure communication between the middleware and the authentication platform.

[0076] Step 202, the authentication platform receives the authentication signal, and sends the authentication platform information to the middleware;

[0077] It should be noted that the authentication p...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a security network middleware for identity authentication, a method and apparatus for implementing the same. The middleware comprises an interface layer, a function layer and an engine layer. The interface layer is located on top of the function layer and is used for providing a channel for the client to call the middleware. The function layer is located on top of the engine layer, and is used for providing service interface to the interface layer, and is responsible for service realization of the middleware. The service includes signature, check mark, encryption and decryption. The engine layer comprises a national secret algorithm engine, an OpenSSL algorithm engine and a hardware algorithm engine. The middleware of the application is a front terminal of the authentication platform for collecting user information, which provides protection for safely collecting user identity information and avoids malicious use of the user identity information after the third-party network application collects the user identity information. At the same time, the user identity information is avoided to be stolen in the transmission process from the client to the authentication platform and from the authentication platform to the third-party network application.

Description

technical field [0001] The present application relates to the technical field of network security, in particular to a secure network middleware for identity authentication and its implementation method and device. Background technique [0002] It is a very common business scenario to confirm user identity information on the client. Because the process of user identity information authentication has a remote nature, the authentication platform uses some authentication methods such as portraits, PIN codes, fingerprints and other personal privacy information to verify the identity of the user's claimed identity and his real identity. [0003] Generally speaking, the authentication platform needs to collect the user identity information of the client through a third-party network application. However, third-party network applications sometimes steal user identity information and maliciously use user identity information, resulting in leakage of user identity information and ult...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/31G06F21/62
CPCG06F21/31G06F21/6263G06F2221/2107
Inventor 曹延昌黄何
Owner 北京庚金科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products