Method for safety efficient network user identity discrimination
A network user and identity authentication technology, applied in the direction of user identity/authority verification, etc., can solve the problems of low efficiency, limited management user scale, and high establishment cost
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0033] The implementation steps of the identity authentication method are illustrated below in conjunction with the accompanying drawings:
[0034] figure 1 : Indicates the authentication process of the network user identity, that is: the network user identity authentication protocol, the client first sends an authentication request to the network authentication server and sends the user number, and the network authentication server immediately generates a set of time stamps and random numbers after receiving the user number and sends them For the client, both ends generate their own authentication passwords at the same time, the process is:
[0035] (1) The network authentication server regenerates the authentication life cycle T, according to the received user number, the time stamp generated by itself and the algorithm composed of the first 16 digits of the random number, from the N group M group user keys corresponding to the user number " The "seed" ciphertext is: select...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com