Identity authentication system of network user and method

An identity authentication and network user technology, applied in the field of network user identity authentication, can solve problems such as user password insecurity, user confusion, and lack of intuition, and achieve the effects of improving security performance, easy operation of the method, and simple structure

Inactive Publication Date: 2007-07-04
SHENGDA COMP SHANGHAI
View PDF0 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Due to the lack of control over user registration in this way, many invalid users who use spam registration information often flood the system. They never use the service, but occupy most of the user name space, resulting in those who really want to register and use the service. Valid user, unable to register with a user name that is easy to remember
[0005] This kind of common authentication method is only a process of entering the user name and password to log in, which is not intuitive enough, but also easy to be stolen in the network environment.
For the sake of convenience, some users use the same password in different network services, which will bring great security risks. Once a password is stolen by a network monitoring program, multiple network service account passwords will often be stolen
[0006] Although in order to facilitate user login, the system can save the user's account and password in the network service client, but in this way, the access and use of the account and password are restricted by the client. If there is an insecure factor on the client, If it is implanted into a Trojan horse or used by multiple people to share a client, it will pose a great threat to the security of the user account
[0007] In addition, if the client or system is reinstalled, or used on other people's computers, it will be necessary to recall the corresponding account password again, which will cause great trouble to users.
[0008] These user passwords are not securely stored on the client side and transmitted on the network, resulting in the need for users to change their passwords frequently, exacerbating the inconvenience of use

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication system of network user and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] In order to solve many problems encountered in common authentication and login, the present invention provides users who are not familiar with computer and network technology with a convenient and safe registration and login authentication method, and this method can also be applied to electronic payment security authentication through the network and many other fields.

[0020] The network user identity authentication system of the present invention includes a client computer, a dynamic password generator and a server, the dynamic password generator is connected to the client computer, and a unique generator serial number is recorded on it and can generate a dynamic password; The client computer and the server are connected to each other through a communication network; the server is provided with a dynamic password verification module corresponding to the dynamic password generator, so as to ensure that the dynamic password generated by the dynamic password generator c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a network user identification authentication system, including the client computer, the dynamic password generator and the server, in which the said computer connects to the server through communication network, and the said dynamic password generator connects to the computer, and the said server has the dynamic password checking module. The invention also discloses a network user identification authentication method, including: firstly, the user registers, and then, the client processes login application, and the dynamic password generator generates dynamic password, and then the computer transmits the user identification and dynamic password to the server though communication network, and then, the dynamic password checking module of the server checks the dynamic password, thereby determining the legality of the login application. The authentication architecture of the system in the invention is simple and easy to operate, and it can make users easily login whether or not knowing the network operation, and greatly improve the system's security performance.

Description

technical field [0001] The invention relates to a user identity authentication system, in particular to a user identity authentication system through a network. The invention also relates to a network user identity authentication method. Background technique [0002] In various network applications, different users need to be distinguished according to different application environments, so it is necessary to authenticate them before providing corresponding services. In fields such as e-commerce and online payment, since funds and property are involved, it is more necessary to have a safe and reliable identity confirmation method. Network transaction is a way of communication without face-to-face. Among the various existing authentication methods, security and convenience have always been a pair of contradictory factors. [0003] For ordinary users who are not familiar with computers and networks, they are used to using physical credentials for identity authentication, suc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/16
Inventor 陶春奚嘉迪张晓军胡灏
Owner SHENGDA COMP SHANGHAI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products