A network authentication smart card and method

A network authentication and smart card technology, applied in the field of data transmission, can solve the problems of unreliability, affect terminal authentication request, and untrustworthy authentication process, and achieve the effect of preventing malicious attacks, preventing single sign-on fraud, and reducing implementation costs.

Active Publication Date: 2022-03-15
北京光润通科技发展有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

As long as the machine communicates with the intranet server a few times, the validity of the authentication information can be obtained; and the traditional login authentication system is a single point to the authentication server, and the participating authentication party only has one server host, the following unreliability will occur Scenario: 1) If the server suddenly fails, it will affect the authentication request of the terminal and subsequent terminals; 2) If the server is attacked maliciously, the authentication process will be untrustworthy; 3) If the authentication information requested by the terminal contains multiple requests authentication block, a single authentication server can only process multiple request blocks sequentially, which inevitably delays processing

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A network authentication smart card and method
  • A network authentication smart card and method
  • A network authentication smart card and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The present invention will be described in further detail below in conjunction with the accompanying drawings and the following embodiments.

[0026] The present invention provides a network authentication method, such as figure 1 shown, including the following steps:

[0027] S1: When a terminal requests to log in, start the network card authentication system according to the self-credential of the network card of the terminal. The self-credential of the network card is whether the network card is inserted, that is, a smart card. Only a terminal with a smart card inserted can become a The trusted body builds a cluster of the network authentication system;

[0028] S2: After the network card authentication system is started, the terminal sends an identity authentication request to the network card authentication system;

[0029] S3: After receiving the successful identity authentication information fed back by the network card authentication system, the user credentia...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of data transmission, and in particular relates to a smart card for network authentication and a method thereof. The present invention provides a new network authentication smart card and method, the network authentication smart card and method are separated from the online dependence on the central server, completely realize the decentralization, reduce the complexity of system deployment and the implementation cost; the security of the terminal is no longer only It is guaranteed by the communication with the central server, but shared by the trusted body cluster in the system, which enhances the security and reliability of the system; this setting makes access authentication more efficient and flexible. It really realizes multi-point authentication and effectively prevents malicious attacks on business systems. Any login request can initiate authentication for this terminal from multiple points at the same time. Fundamentally prevent single sign-on fraud.

Description

technical field [0001] The invention belongs to the technical field of data transmission, and in particular relates to a smart card for network authentication and a method thereof. Background technique [0002] In the traditional mode, after the local terminal is turned on, you can log in to the system that needs to be logged in by entering the identity credentials, usually the user name and password. As long as the machine communicates with the intranet server a few times, the validity of the authentication information can be obtained; and the traditional login authentication system is a single point to the authentication server, and the participating authentication party only has one server host, the following unreliability will occur Scenario: 1) If the server suddenly fails, it will affect the authentication request of the terminal and subsequent terminals; 2) If the server is attacked maliciously, the authentication process will be untrustworthy; 3) If the authenticatio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40
CPCH04L63/08H04L63/0428H04L63/0815H04L63/083
Inventor 不公告发明人
Owner 北京光润通科技发展有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products