Network authentication method for secure user identity verification
a network authentication and user identity technology, applied in the field of network identity authentication, can solve the problems of user inconvenience, duplication of investment in user identity authentication, and high cost of customer service for personalization, distribution and troubleshooting
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Benefits of technology
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0021]Referring to FIG. 1, a network authentication system is used to implement a network authentication method for secure verification of the identity of a user 5 according to the preferred embodiment of the present invention. The network authentication system includes a downloading unit 1, a user terminal 2 owned by the user 5, a content-provider server 3 (e.g., an internet content provider or ICP), and a plurality of identity verification servers 4. For exemplary purposes, the user terminal 2 is owned by the user 5, and may be an electronic device capable of Internet browsing or data communication, such as a notebook computer, a smart phone, a personal digital assistant, etc. The user terminal 2 includes a plurality of hardware components (not shown), such as a central processing unit, a basic input / output system (BIOS) unit, a storage device, a network interface, a motherboard, etc., each of which has a unique identification code. The content-provider server 3 may be, but is not...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 