CN102546673A - Method for setting network user identity based on single identity authentication - Google Patents

Method for setting network user identity based on single identity authentication Download PDF

Info

Publication number
CN102546673A
CN102546673A CN2012100677821A CN201210067782A CN102546673A CN 102546673 A CN102546673 A CN 102546673A CN 2012100677821 A CN2012100677821 A CN 2012100677821A CN 201210067782 A CN201210067782 A CN 201210067782A CN 102546673 A CN102546673 A CN 102546673A
Authority
CN
China
Prior art keywords
identity
network
sub
user
undernet
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2012100677821A
Other languages
Chinese (zh)
Other versions
CN102546673B (en
Inventor
马骏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Dongying Huang Huang Intellectual Property Management Co., Ltd.
Original Assignee
马骏
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 马骏 filed Critical 马骏
Priority to CN201210067782.1A priority Critical patent/CN102546673B/en
Publication of CN102546673A publication Critical patent/CN102546673A/en
Application granted granted Critical
Publication of CN102546673B publication Critical patent/CN102546673B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention relates to the technical field of World Wide Web, in particular to a method for setting network user identity based on single identity authentication. The method is characterized in that: a network operator registers a single mother network identity for a network user through identity authentication, and the network user registers a plurality of sub-network identities under the mother network identity as required to respectively meet respective specific application function requirements of various roles of a single network user; and mutual independence or resource sharing among the sub-network identities can be realized, and the mother network identity can control and manage the sub-network identities. By the method, the mother network identity of a user corresponds to real identity, a phenomenon that a user applies for a network user identity by faking the identity of other personnel is reduced, the method has positive impact on normalizing network environment, protecting the legitimate rights and interests of network users and fighting against network crimes, and requirements of network users on network identity diversification can be met by a plurality of the sub-network identities and multi-stage sub-network identities.

Description

Network user identity method to set up based on the single capacity authentication
Technical field
The present invention relates to the web technology field, be specifically related to a kind of network user identity method to set up based on the single capacity authentication.
Background technology
When current network terminal registration and login; The most of website operator (Internet Service Provider) and the failed call network user carry out the authentication based on identity card; The website operator (Internet Service Provider) that part requires to carry out authentication does not limit the pairing network user of authentication (single capacity card) yet and applies for quantity; Carry out authentication registered network user's phenomenon with regard to existing to claim the identity of others fraudulently; And the network user does not understand how many network identities with his authentication is arranged on a certain website, more can't these network identities be managed, thus the generation that can't stop the uncivil and illegal incidents of many networks.
Summary of the invention
To above-mentioned defective; The present invention provides that a kind of flow process is simple, the network user identity method to set up based on the single capacity authentication of safe ready; It limits single female network identity through authentication; Make female network identity of the network user corresponding one by one with real identity realization, and through realize the variation of single real user network identity in the sub-network identity of single female network identity set inside.
The present invention realizes through following technical scheme: at first website operator gives the network user through authentication and registers unique female network identity; The network user registers a plurality of sub-network identity as required under above-mentioned female network identity then, comes to realize respectively the concrete application function demand of diversified identity; Be separate or resource-sharing between the described sub-network identity, and female network identity can control and management sub-network identity.Because female network identity need pass through network identity validation, and each identification card number can only be registered a female network identity, the situation appearance of therefore having stopped to claim the identity of others fraudulently and having demonstrate,proved the registered network user; The diversified realization of network identity simultaneously realizes through a plurality of sub-network identity under female network identity; Between the different sub network identity through the user be provided with can be separate, carry out resource-sharing partly or completely; The female network identity of one of which can improve fail safe to the restriction of checking; Its more than two sub-network identity can realize that the network user is to the multifarious application need of network identity; It greatly facilitates the network user's needs three through to the setting of the resource-sharing between each child network identity; The setting of a plurality of in addition sub-network identity is managed through female network identity; Such as each child network identity being added, share operations such as data is provided with between modification, deletion or the sub-network identity, but the sub-network identity can not or be operated with the sub-network identity of its sane level female network identity.
According to the network user's actual needs, improve the variation of using, the sub-network identity can also be provided with a plurality of undernet identity, forms the multistage identity of user on network by that analogy.But the network identity of each grade can only carry out control and management through the network identity of upper level, and can not manage the network identity of higher level or sane level.
The login form of undernet identity is can be diversified; Such as female network identity single password is set; Can get into each undernet identity after logining successively operates; Perhaps each undernet identity is provided with different ciphers respectively, and operate at the different different undernet identity interfaces that get into automatically through the input password when landing female network identity, directly logins through input undernet identity and corresponding password thereof again or directly.
Female network identity that the present invention has realized the user is corresponding one by one with real identity; Reduced the generation of the log on user's that claims the identity of others fraudulently phenomenon; For the standard network environment; Hit the network crime and have positive impact, and in restriction single network user identity, can guarantee the variation of user network identity again through multilevel subnetwork network identity; Also can guarantee the controllability of real user through female network identity login back to the management of each undernet identity simultaneously, reduce the generation of falsely using phenomenons such as other people network identity crime a plurality of network identities.
Description of drawings
Fig. 1 is the structural representation of an embodiment of the present invention.
Embodiment
With reference to Fig. 1, a kind of network user identity method to set up based on the single capacity authentication, this status is verified as three grades; After promptly at first opening network, according to website operator (Internet Service Provider) prompting, the network user submits authentication to the personal identification papers; After passing through through client audit, promptly register a female network identity, and this network identity is unique; Its real identity with the network user is corresponding one by one, i.e. the corresponding female network identity of identification card number; The network user is according to self needs then; The a plurality of sub-network identity of registration under female network identity; So that realize user's multinomial application demand; Registration process also will be set authentication (such as password is set), and the user can be set to the form of separate (protection privacy) and resource-sharing (can all share also and can partly share) according to the needs of practical application between a plurality of sub-network identity; Promptly be independent of other network identities such as sub-network identity 1; Sub-network identity 2 is shared photograph album with sub-network identity 3, and sub-network identity 3 is shared photograph album, shared the contact person with sub-network identity 4 with sub-network identity 2, and sub-network identity 4 is shared the contact person with sub-network identity 3; And sub-sub-network identity 1-3 is set under the sub-network identity 1, its method to set up and a plurality of sub-network identity each other is similar, repeats no more.The identity of upper level can be carried out control and management to the identity of next stage; Can the antithetical phrase network identity and operation such as sub-sub-network identity is added, modification, deletion or shared data are provided with such as female network identity, in like manner the sub-network identity also can be carried out above-mentioned management to the sub-sub-network identity of next stage.But the identity of each grade can only perhaps self be carried out control and management through the identity of upper level, and can not manage other identity of higher level or sane level.
Authentication can be set respectively in identity logins at different levels or only female network identity is provided with authentication; Verification method is selected can be diversified, such as login password is set, perhaps binds mobile phone and send identifying code; Forms such as digital certificate perhaps are installed again, just do not enumerate one by one at this.
Be example with the known Tengxun website of present masses below, further the present invention will be described.At first the website is when the user logins this website first; Use (such as mailbox, QQ chat, microblogging, forum etc.) if want the diverse network of participating in this website, need submit application for registration to client, application for registration must be through the checking of identity card; Give the network user a female network application identity after the checking; The form of expression of this identity can be arbitrarily, can be client providing with the machine also can be that user oneself confirms, this identity is corresponding one by one with my identification card number; The user wants to keep the own variation of identity on network, such as different virtual demand such as work, life, amusements according to actual needs then; The user can register a plurality of sub-network identity through client under female network identity; Be respectively applied for different demands, can provide for client such as the sub-network identity different QQ number, the user can be set to work QQ, amusement QQ and life QQ etc. as required; Each QQ number application form can comprise mailbox, microblogging, photograph album etc.; This moment can be according to user's needs, and can be provided with one of them QQ number is fully independently, and its information is shared with other QQ number; With the protection individual privacy, QQ promptly can above-mentionedly be provided with such as work; Other inoperatives QQ such as life QQ, amusement QQ; The resource that the user can be set between two or more arbitrarily QQ is as required all shared or is partly shared; To reach the information resources of utilizing to greatest extent on each QQ, satisfy the maximum application demand of user.In like manner under the sub-network identity sub-sub-network identity can also be set as required; Such as being set to domestic service QQ, overseas operation QQ etc. under the work QQ; By that analogy; Can realize the application of the multistage sub-identity under same female network identity, fail safe has also increased the demand of single network user's multiple network identity when improving.In addition; Female network identity can be managed the sub-identity of subordinate, such as deleting work QQ, increases outdoor QQ; Perhaps adjust the content of resource-sharing between each QQ etc.; Certain female network identity also can antithetical phrase sub-network identity or more the identity of next stage carry out above-mentioned management, but subordinate's identity can not manage higher level's identity, therefore can guarantee the controllability of real user to a plurality of network identities.
Network identities at different levels are specifically logined form can be diversified; Such as female network identity single password is set; Can get into each undernet identity after logining successively operates; Perhaps each undernet identity is provided with different ciphers respectively, and operate at the different different undernet identity interfaces that get into automatically through the input password when landing female network identity, directly logins through input undernet identity and corresponding password thereof again or directly.
The present invention goes for the various websites on the present network, improves the fail safe of network, and makes that the network user's is more convenient to operate; Below only be an exemplary embodiments of the present invention, do not limit to and present embodiment that as long as the simple adjustment that those skilled in the art carry out for such scheme identical with method to set up principle of the present invention, all falls within protection scope of the present invention.

Claims (4)

1. network user identity method to set up based on the single capacity authentication; It is characterized in that; At first website operator gives the network user through ID card verification and registers unique female network identity; The network user registers a plurality of sub-network identity as required under above-mentioned female network identity then, comes to realize respectively the concrete application function demand of diversified network identity; Be separate or resource-sharing between the described sub-application identity, and female network identity can control and management sub-network identity.
2. the network user identity method to set up based on the single capacity authentication according to claim 1; It is characterized in that; The network user can also register a plurality of undernet identity under the sub-network identity; Form the network user's multistage identity by that analogy, and higher level's network identity can control and management undernet identity.
3. the network user identity method to set up based on the single capacity authentication according to claim 1 and 2 is characterized in that, described undernet identity can not be carried out control and management to higher level's network identity or with the network identity of its sane level.
4. the network user identity method to set up based on the single capacity authentication according to claim 3; It is characterized in that; The login form of said undernet identity is: female network identity is provided with single password; Can get into each undernet identity after logining successively operates; Perhaps each undernet identity is provided with different ciphers respectively, and operate at the different different undernet identity interfaces that get into automatically through the input password when landing female network identity, directly logins through input undernet identity and corresponding password thereof again or directly.
CN201210067782.1A 2012-03-15 2012-03-15 Method for setting network user identity based on single identity authentication Active CN102546673B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210067782.1A CN102546673B (en) 2012-03-15 2012-03-15 Method for setting network user identity based on single identity authentication

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210067782.1A CN102546673B (en) 2012-03-15 2012-03-15 Method for setting network user identity based on single identity authentication

Publications (2)

Publication Number Publication Date
CN102546673A true CN102546673A (en) 2012-07-04
CN102546673B CN102546673B (en) 2014-10-08

Family

ID=46352631

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210067782.1A Active CN102546673B (en) 2012-03-15 2012-03-15 Method for setting network user identity based on single identity authentication

Country Status (1)

Country Link
CN (1) CN102546673B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114817938A (en) * 2021-01-28 2022-07-29 海信集团控股股份有限公司 Method and equipment for accessing shared photo album and protecting private pictures of shared photo album

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1917711A (en) * 2006-08-29 2007-02-21 中国移动通信集团公司 Method for processing information of user's ID
CN1917665A (en) * 2006-08-29 2007-02-21 中国移动通信集团公司 Data association method for mobile terminal in multiple virtual communities
CN101441734A (en) * 2007-11-19 2009-05-27 上海久隆电力科技有限公司 Unite identification authentication system
CN101741558A (en) * 2008-11-12 2010-06-16 上海长江数码科技有限公司 Method for realizing uniform identity authentication
CN102045367A (en) * 2011-01-10 2011-05-04 软库创投(北京)科技有限公司 Registration method and authentication server of real-name authentication

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1917711A (en) * 2006-08-29 2007-02-21 中国移动通信集团公司 Method for processing information of user's ID
CN1917665A (en) * 2006-08-29 2007-02-21 中国移动通信集团公司 Data association method for mobile terminal in multiple virtual communities
CN101441734A (en) * 2007-11-19 2009-05-27 上海久隆电力科技有限公司 Unite identification authentication system
CN101741558A (en) * 2008-11-12 2010-06-16 上海长江数码科技有限公司 Method for realizing uniform identity authentication
CN102045367A (en) * 2011-01-10 2011-05-04 软库创投(北京)科技有限公司 Registration method and authentication server of real-name authentication

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
刘冰: "在数字化校园中利用Portal和Ldap实现统一身份认证的研究与应用", 《中国优秀硕士论文全文数据库》 *
黄剑飞: "LDAP在校园网统一身份认证中的应用", 《中国优秀硕士论文全文数据库》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114817938A (en) * 2021-01-28 2022-07-29 海信集团控股股份有限公司 Method and equipment for accessing shared photo album and protecting private pictures of shared photo album
CN114817938B (en) * 2021-01-28 2024-05-17 海信集团控股股份有限公司 Method and equipment for accessing shared album and protecting private pictures of shared album

Also Published As

Publication number Publication date
CN102546673B (en) 2014-10-08

Similar Documents

Publication Publication Date Title
Yazdinejad et al. Blockchain-enabled authentication handover with efficient privacy protection in SDN-based 5G networks
Wolinsky et al. Dissent in numbers: Making strong anonymity scale
CN105516980B (en) A kind of wireless sensor network token authentication method based on Restful frameworks
US20150288701A1 (en) Invitation links with enhanced protection
CN104580364B (en) A kind of method and apparatus of resource sharing
CN103347020B (en) A kind of system and method across application authorization access
CN103944890A (en) Virtual interaction system and method based on client/server mode
CN104883402A (en) Information processing method and cloud-end service platform
CN103259770A (en) Login method and login server
CN106534082B (en) User registration method and device
CN109067785A (en) Cluster authentication method, device
CN101202631A (en) System and method for identification authentication based on cipher key and timestamp
CN107046577B (en) Cloud mixing method and system
CN108400962A (en) A kind of Authentication and Key Agreement method under multiserver framework
CN103546290B (en) Third Party Authentication system or method with user group
CN105704154B (en) A kind of service processing method based on RESTful, apparatus and system
CN103379093A (en) Method and device for achieving account intercommunication
CN101227477A (en) Method for implementing subscriber terminal access authentication
US9848017B2 (en) Techniques for identity and policy based routing
US20240022414A1 (en) Authentication of communication session participants using blockchain
CN109379339A (en) A kind of portal authentication method and device
CN102546673B (en) Method for setting network user identity based on single identity authentication
CN101247369B (en) User information expression method, instant communication system and equipment in instant communication
WO2020123237A1 (en) Secure virtual personalized network
EP4030687A1 (en) Authenticating anonymous information

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20180604

Address after: 257091 Software Park 228, South 1 road, Dongcheng, Dongying, Shandong C-201

Patentee after: Dongying Huang Huang Intellectual Property Management Co., Ltd.

Address before: 257091 Dongying municipal municipal administration bureau, 276 east two road, Dongying District, Dongying, Shandong

Patentee before: Ma Jun

TR01 Transfer of patent right