An identity authentication system and authentication method based on cross-network transmission and ctid network certificate authentication

A technology of identity authentication and authentication system, which is applied in the field of identity authentication system based on cross-network transmission and CTID network certificate authentication, can solve the problems of high authentication cost, low security, and increased risk of sensitive information leakage, so as to reduce authentication cost effect

Active Publication Date: 2022-04-12
ANHUI JIYUAN SOFTWARE CO LTD +1
View PDF11 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

As a result, these enterprises and institutions have to move sensitive information from the intranet to the Internet when using identity authentication services, increasing the risk of sensitive information leakage
There are many methods for identity authentication in the prior art, but most of the authentication methods use user passwords to authenticate user identities. Password authentication is easy to be stolen, the security is not high, and the authentication cost is also high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An identity authentication system and authentication method based on cross-network transmission and ctid network certificate authentication
  • An identity authentication system and authentication method based on cross-network transmission and ctid network certificate authentication
  • An identity authentication system and authentication method based on cross-network transmission and ctid network certificate authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The present invention will be further described below in conjunction with accompanying drawing:

[0027] Such as Figure 1-3 As shown, the identity authentication system based on cross-network transmission and CTID network certificate authentication in this implementation includes Internet authentication system 1 and intranet authentication system 2, and Internet authentication system 1 includes Internet authentication center 11, desensitization authentication library 12, public security Network authentication system 13 and Internet industry application 14, intranet authentication system 2 includes core sensitive library 22, intranet authentication center 21 and intranet industry application module 23;

[0028] The Internet authentication center 11 is connected with the public security network certificate system 13 through the Internet, and is used to identify user identity information and return the authentication result. A human face recognition engine 2 is arranged i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an identity authentication system and authentication method based on cross-network transmission and CTID network certificate authentication, comprising: receiving an authentication request sent by a user, and querying whether there is the user information by calling a desensitization authentication library; if the desensitization authentication library queries If there is no such user information, the authentication request will be sent to the public security network system for authentication, and the authentication result will be returned through the public security network system. If the desensitization authentication database queries the information of this person, the authentication request will be sent to the intranet authentication through the cross-network communication channel Center, the internal network authentication center calls the core sensitive database data, and obtains the authentication result through the comparison of the face recognition engine, and then returns the authentication result to the Internet authentication center through the cross-network communication channel, and sends it to the Internet industry application; if the authentication is passed, then Store the relevant authentication data in the desensitization authentication database, otherwise the authentication ends. The present invention provides credible identity authentication services for intranet and intranet industry applications under the condition of ensuring the security of sensitive data on the intranet. The method is simple and can reduce a large amount of authentication costs.

Description

technical field [0001] The invention relates to the technical field of cross-network data transmission, in particular to an identity authentication system and authentication method based on cross-network transmission and CTID network certificate authentication. Background technique [0002] With the rapid development of information technology, all kinds of e-commerce, e-government, and social public services have been integrated into all aspects of people's lives. Clothing, food, housing, transportation, entertainment, shopping, government, etc. can be handled online through smart phones and tablets. Learning and other businesses. [0003] However, there are many problems in identity authentication in cyberspace, such as illegal or excessive collection and sale of identity information, mass theft of identity information, mixed identity authentication services, and weak protection of personal information. With the promulgation and implementation of the "Network Security Law"...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40
CPCH04L63/0861H04L63/0876
Inventor 章玉龙夏同飞李志陈今胡鹏戴聿雯
Owner ANHUI JIYUAN SOFTWARE CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products