Network real-name authentication method and system
A real-name authentication and network technology, applied in the field of network and information security, can solve problems such as the inability to confirm the authenticity of physical characteristics of network activity personnel, and achieve the elimination of unauthorized access to network resources with fake identities, overcome identity authentication problems, and overcome identity recognition puzzle effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0015] What this embodiment describes is a network real-name authentication method and system. The system used in the method includes: an authentication terminal and a real-name authentication server, such as figure 1 Shown. The authentication terminal is used for identity authentication digital signature preparation password; the authentication terminal operation interface is provided with a rule key for addition, a rule for subtraction, a rule for multiplication, a rule for misplacement, a rule for carry, and a rule for abdication. Key, 1 number rule key, 2 number rule key, 3 number rule key, 4 number rule key, 5 number rule key, 6 number rule key, 7 number rule key, 8 number rule key, 9 number rule key and fingerprint key, including 6 digits of dynamic password; password is prepared based on operation rule key and fingerprint key identity authentication and dynamic password digital signature; the authentication terminal has a memory to store identity identification rule key a...
Embodiment 2
[0027] This embodiment is an improvement of the network real-name authentication method and system described in the first embodiment in the step of performing network real-name authentication through identity identification rule keys, identity certification fingerprints and human behavior, such as image 3 Shown.
[0028] The sub-steps in the network real-name authentication step through the identity identification rule key, identity certification fingerprint and human behavior include:
[0029] Real-name authentication server dynamic password survival module survival dynamic password is sent to the sub-step of the authentication terminal operation interface;
[0030] Network activity personnel operate the sub-steps of authentication terminal rule key and fingerprint key real-name authentication through identity identification rule key and identity certification fingerprint and human behavior;
[0031] The authentication terminal is based on network activity personnel operating rule k...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com