Attestation method and safe identification method for network identity

A technology of network identity and authentication method, applied in the field of network identity authentication, can solve the problem of inability to implement, dare not release data easily, and achieve the effect of avoiding deception

Inactive Publication Date: 2006-02-22
彭国展
View PDF1 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] However, since the authentication work involves customers' personal identity information, everyone regards it as the top secret, and dare not release relevant information to network security vendors easily, which also makes it impossible to implement the concept of outsourcing security authentication
[0006] How can network operators rest assured that they can outsource the security authentication mechanism, but still be able to effectively grasp the confidentiality of customer identity information; It has become a difficult problem for the industry to effectively identify users.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Attestation method and safe identification method for network identity
  • Attestation method and safe identification method for network identity
  • Attestation method and safe identification method for network identity

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] The technical content, features and effects of the present invention will be described in detail below in conjunction with the preferred embodiments given in the accompanying drawings.

[0039] like figure 2 As shown, the Chinese invention patent application No. 200410037286.7 proposed by the applicant provides a method for identity authentication with a password library, which requires the user to bring a password machine or a password card in addition to memorizing his own account password. Store a certain number of identification passwords on the memory card or password card of the machine, and each password has a fixed corresponding address. When a financial institution accepts the user's connection in step 31, it then requires the user to input such as name, ID card number, identity authentication password and other identity identification data; and after the server confirms that the above information is correct in step 33, it will choose any password address to i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an identification method of network identification and a safe recognizing method. The network server replaces the identification information of user with a code, to store the identification information of user only in the identification data base which connects the server; the identification center for security identification only supports the reorganization that if said code can supply relative identification code. So the network manager can authorize the proxy to process the identification correctly without worrying the leakage of user's information. In addition, the invention stores a checked on-line website list in the identification code device to find counterfeit websites for reducing the probability of successfully cheating the identification information of user.

Description

Technical field: [0001] The invention relates to a network identity authentication method and a security identification method thereof, and the authentication work can be entrusted to an agent for processing by using the method. Background technique: [0002] At present, the way to log in personal identity on websites such as online banking or online games is still mainly that each user uses his or her name, ID card number, birthday, self-selected name, etc. as identification data, and chooses a single set of identity authentication passwords . When performing financial operations such as figure 1 As shown, the server of the financial institution accepts the user's connection in step 11, and then accepts the user's input of identification information such as name, ID number, and identity authentication password in step 12; the server confirms the above information in step 13 After being correct, the user's instruction can be accepted in step 14, and financial related busin...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32G06F17/30
Inventor 彭国展彭靖
Owner 彭国展
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products