Network real-name authentication method and system

A real-name authentication and network technology, applied in the field of network and information security, can solve problems such as the inability to confirm the authenticity of physical characteristics of network activity personnel, and achieve the elimination of unauthorized access to network resources with fake identities, overcome identity authentication problems, and overcome identity recognition puzzle effect

Inactive Publication Date: 2020-06-05
BEIJING PASSWORD TECH
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Due to the current network identity authentication method, the authentication system can only confirm the legitimacy of what is known and possessed, including the unique physical characteristics, but cannot confirm the authenticity of the identities of network activity personnel, including the unique physical characteristics.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network real-name authentication method and system
  • Network real-name authentication method and system
  • Network real-name authentication method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0015] What this embodiment describes is a network real-name authentication method and system. The system used in the method includes: an authentication terminal and a real-name authentication server, such as figure 1 Shown. The authentication terminal is used for identity authentication digital signature preparation password; the authentication terminal operation interface is provided with a rule key for addition, a rule for subtraction, a rule for multiplication, a rule for misplacement, a rule for carry, and a rule for abdication. Key, 1 number rule key, 2 number rule key, 3 number rule key, 4 number rule key, 5 number rule key, 6 number rule key, 7 number rule key, 8 number rule key, 9 number rule key and fingerprint key, including 6 digits of dynamic password; password is prepared based on operation rule key and fingerprint key identity authentication and dynamic password digital signature; the authentication terminal has a memory to store identity identification rule key a...

Embodiment 2

[0027] This embodiment is an improvement of the network real-name authentication method and system described in the first embodiment in the step of performing network real-name authentication through identity identification rule keys, identity certification fingerprints and human behavior, such as image 3 Shown.

[0028] The sub-steps in the network real-name authentication step through the identity identification rule key, identity certification fingerprint and human behavior include:

[0029] Real-name authentication server dynamic password survival module survival dynamic password is sent to the sub-step of the authentication terminal operation interface;

[0030] Network activity personnel operate the sub-steps of authentication terminal rule key and fingerprint key real-name authentication through identity identification rule key and identity certification fingerprint and human behavior;

[0031] The authentication terminal is based on network activity personnel operating rule k...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the field of network and information security, in particular to a network real-name authentication method and system in the field of network and information security. The system used by the network real-name authentication method disclosed by the invention comprises an authentication terminal and a real-name authentication server. The method comprises the following operation steps: an identity identification rule secret key operation step; a step of identity authentication fingerprint operation; a step of human behavior operation; and a step of performing network real-name authentication operation through a identity identification rule key, an identity authentication fingerprint and human behaviors. According to the invention, an identity identification rule key, an identity authentication fingerprint and human behaviors are adopted, rule keys and a fingerprint key of the authentication terminal, a memory identity identification rule key, identity certificate fingerprint identity authentication and a dynamic password digital signature compilation cipher are operated, the cipher is sent to the real-name authentication server to decrypt and restore a dynamicpassword to perform real-name authentication, and absolute security of network resource authorized access is effectively guaranteed.

Description

Technical field [0001] The invention relates to the field of network and information security, in particular to a network real-name authentication method and system in the field of network and information security. Background technique [0002] The current network identity authentication uses three methods of knowing and possessing, including unique physical characteristics, to confirm the authenticity of the identity of network activity personnel. The first way is known, such as a static password or a dynamic password, and so on. The authentication system confirms the authenticity of each other's identity by logging in a static password or a dynamic password. Based on the authentication system, it can only confirm the legitimacy of static passwords or dynamic passwords, and cannot confirm the authenticity of the identities of static passwords or dynamic passwords. If the static password or the dynamic password is attacked, the attacker can forge the identity of unauthorized ac...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
CPCH04L9/3247H04L63/083H04L63/0861H04L63/10
Inventor 不公告发明人
Owner BEIJING PASSWORD TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products