Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for safety efficient network user identity discrimination

A network user and identity authentication technology, applied in the direction of user identity/authority verification, etc., can solve the problems of low efficiency, limited management user scale, and high establishment cost

Active Publication Date: 2007-01-03
胡祥义
View PDF0 Cites 28 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] At present, the network identity authentication products based on cryptographic algorithms produced by some domestic and foreign manufacturers all use public key technology such as: PKI and IBE, etc. PKI technology needs to establish a CA digital certification center, and the establishment cost of PKI is high. 10,000 CA digital certification The center is: a sub-CA system and 10,000 databases need to be established, and the number of users that can only be managed is: 10 7 -10 8 , that is: the scale of management users is very limited. In addition, both PKI and IBE must establish a huge certificate or parameter database to provide online comparison and authentication for identity authentication, which is inefficient and requires manual intervention for key updates, so key update services must be delivered every year. The operating cost is very high, which makes the application and popularization of PKI and IBE technology more difficult

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for safety efficient network user identity discrimination
  • Method for safety efficient network user identity discrimination

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] The implementation steps of the identity authentication method are illustrated below in conjunction with the accompanying drawings:

[0034] figure 1 : Indicates the authentication process of the network user identity, that is: the network user identity authentication protocol, the client first sends an authentication request to the network authentication server and sends the user number, and the network authentication server immediately generates a set of time stamps and random numbers after receiving the user number and sends them For the client, both ends generate their own authentication passwords at the same time, the process is:

[0035] (1) The network authentication server regenerates the authentication life cycle T, according to the received user number, the time stamp generated by itself and the algorithm composed of the first 16 digits of the random number, from the N group M group user keys corresponding to the user number " The "seed" ciphertext is: select...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This invention relates to a method for identifying network user identities, first of all, a customer end machine initiates an identification request, a network identification server generates a set of time stamps and random numbers and sends them to the customer machine and generates the life period T of the identification process, the customer machine and the server compute a set of symmetrical cryptographic keys and identification passwords separately, the passwords of the customer end are transmitted to the network identification server, which computes if T is finished, if so, it is the illegal user, if not, it compares if the passwords at both ends are the same, if so, they are legal and the log-on is successful otherwise they are illegal and the log-on is failed.

Description

Technical field: [0001] The invention relates to the field of information security, and uses cryptographic technology to identify network user identities. The technical method can prevent illegal or unauthorized network access, and is suitable for e-government, e-commerce, online banking, online games, and electronic national defense. Background technique: [0002] At present, the network identity authentication products based on cryptographic algorithms produced by some domestic and foreign manufacturers all use public key technology such as: PKI and IBE, etc. PKI technology needs to establish a CA digital certification center, and the establishment cost of PKI is high. 10,000 CA digital certification The center is: a sub-CA system and 10,000 databases need to be established, and the number of users that can only be managed is: 10 7 -10 8 , that is: the scale of management users is very limited. In addition, both PKI and IBE must establish a huge certificate or parameter d...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32
Inventor 胡祥义
Owner 胡祥义
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products