Unlock instant, AI-driven research and patent intelligence for your innovation.

Network authentication method for secure user identity verification

a network authentication and user identity technology, applied in the field of network identity authentication, can solve the problems of user inconvenience, duplication of investment in user identity authentication, and high cost of customer service for personalization, distribution and troubleshooting

Active Publication Date: 2015-08-27
LYDSEC DIGITAL TECH CO LTD
View PDF1 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

The present invention aims to provide a network authentication method for secure verification of a user's identity. The technical effects of this invention include overcoming drawbacks of previous methods for network authentication and ensuring secure verification of a user's identity.

Problems solved by technology

Thus, the cost of customer service for personalization, distribution and troubleshooting is considerable.
Further, it is quite inconvenient that the user needs to remember the user ID and the password for each of different ICPs and to have different identity verification devices for the different ICPs.
Moreover, for the different ICPs, duplication of investment in user identity authentication may occur.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network authentication method for secure user identity verification
  • Network authentication method for secure user identity verification
  • Network authentication method for secure user identity verification

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021]Referring to FIG. 1, a network authentication system is used to implement a network authentication method for secure verification of the identity of a user 5 according to the preferred embodiment of the present invention. The network authentication system includes a downloading unit 1, a user terminal 2 owned by the user 5, a content-provider server 3 (e.g., an internet content provider or ICP), and a plurality of identity verification servers 4. For exemplary purposes, the user terminal 2 is owned by the user 5, and may be an electronic device capable of Internet browsing or data communication, such as a notebook computer, a smart phone, a personal digital assistant, etc. The user terminal 2 includes a plurality of hardware components (not shown), such as a central processing unit, a basic input / output system (BIOS) unit, a storage device, a network interface, a motherboard, etc., each of which has a unique identification code. The content-provider server 3 may be, but is not...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

In a network authentication method, a content-provider server redirects a user terminal to an identity verification server for acquiring therefrom an encrypted web address signed with an asymmetrical private key and downloaded from a downloading unit. The user terminal transmits hardware scan data associated therewith to the identity verification server upon determining, based on the encrypted web address and an asymmetrical public key from the downloading unit, that the identity verification server is currently valid to perform identity verification. The identity verification server verifies the identity of the user terminal based on relationship between the hardware scan data and pre-stored reference hardware scan data.

Description

BACKGROUND OF THE INVENTION[0001]1. Field of the Invention[0002]The invention relates to network identity authentication, and more particularly to a network authentication method for secure verification of identity of a user.[0003]2. Description of the Related Art[0004]Currently, a variety of web services, such as cloud services, have become increasingly popular. In order to secure the web services, user identity verification is absolutely necessary.[0005]However, due to increasing numbers of web users and web crimes, and continuous progress of criminal techniques, for example, an Internet content provider (ICP) needs to provide to each user an identity verification device, e.g., a USB device loaded with a public key infrastructure (PKI) certificate, an integrated circuit (IC) electronic card or a dynamic token. Thus, the cost of customer service for personalization, distribution and troubleshooting is considerable. Further, it is quite inconvenient that the user needs to remember t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(United States)
IPC IPC(8): H04L29/06H04L9/30
CPCH04L63/0823H04L63/08H04L9/30H04L63/06H04L63/123H04L9/3247
Inventor LIN, MAW-TSONGSKYGEBJERG, PER
Owner LYDSEC DIGITAL TECH CO LTD