Terminal user identity authentication and link system based on Internet

An identity authentication and end-user technology, applied in user identity/authority verification, transmission system, data exchange through path configuration, etc., can solve problems that affect business development, unreliability, and network users cannot establish trust relationships

Inactive Publication Date: 2002-03-06
杨平良
View PDF0 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] Due to the different user methods of connecting to the Internet (Internet) and the settings of the subnets where the users are located, a relia

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Terminal user identity authentication and link system based on Internet
  • Terminal user identity authentication and link system based on Internet
  • Terminal user identity authentication and link system based on Internet

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0010] The operator management network structure managed by the identity authentication system is the prerequisite for identity authentication. Within a direct management scope, the user is unique. The user data within the same operator can be updated dynamically, and the interactive user data information can be updated at any time according to the data update between the management connection nodes. Set the code parser on the operator's registration server to provide a basis for the selection of communication channels. Each operator registration server has a list of operators, countries, and home regions. Country and region are unified for different operators. In the same country and region, different operators can manage users under their jurisdiction. Country code: The current internationally unified country code can be used, and the area code, user code and operator code are determined by the relevant agencies of the country, but the area code and user code must not use ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A terminal user identity authentication and link system based on Internet is composed of network identity coding unit, identity authentiation system management and link system. Said code include state code, district code, user code and provider marker code. Said identity authentication system management is aimed at managing all Internet users. Said link system consists of register server. Internet channel, router, firewall, bypass server, computer network switch system and Internet user terminals.

Description

technical field [0001] The Internet-based terminal user identity authentication and connection system of the present invention belongs to the network application system of transmission control protocol / internet protocol. Background technique [0002] Due to the difference in the way users connect to the Internet (Internet) and the settings of the subnets they are in, it is impossible to establish a reliable trust relationship between network users. This unreliable relationship affects the business development among Internet-based (Internet) users. Contents of the invention [0003] The purpose of the present invention is to provide an Internet terminal user identity authentication and connection system that can uniquely describe the identity of Internet users, establish trust between communication parties through identity description, and realize point-to-point communication and other business contacts. In order to realize the purpose of the present invention, two main pr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L12/28H04L29/06
Inventor 杨平良
Owner 杨平良
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products