CN102546673A - Method for setting network user identity based on single identity authentication - Google Patents
Method for setting network user identity based on single identity authentication Download PDFInfo
- Publication number
- CN102546673A CN102546673A CN2012100677821A CN201210067782A CN102546673A CN 102546673 A CN102546673 A CN 102546673A CN 2012100677821 A CN2012100677821 A CN 2012100677821A CN 201210067782 A CN201210067782 A CN 201210067782A CN 102546673 A CN102546673 A CN 102546673A
- Authority
- CN
- China
- Prior art keywords
- identity
- network
- sub
- user
- undernet
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Landscapes
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention relates to the technical field of World Wide Web, in particular to a method for setting network user identity based on single identity authentication. The method is characterized in that: a network operator registers a single mother network identity for a network user through identity authentication, and the network user registers a plurality of sub-network identities under the mother network identity as required to respectively meet respective specific application function requirements of various roles of a single network user; and mutual independence or resource sharing among the sub-network identities can be realized, and the mother network identity can control and manage the sub-network identities. By the method, the mother network identity of a user corresponds to real identity, a phenomenon that a user applies for a network user identity by faking the identity of other personnel is reduced, the method has positive impact on normalizing network environment, protecting the legitimate rights and interests of network users and fighting against network crimes, and requirements of network users on network identity diversification can be met by a plurality of the sub-network identities and multi-stage sub-network identities.
Description
Technical field
The present invention relates to the web technology field, be specifically related to a kind of network user identity method to set up based on the single capacity authentication.
Background technology
When current network terminal registration and login; The most of website operator (Internet Service Provider) and the failed call network user carry out the authentication based on identity card; The website operator (Internet Service Provider) that part requires to carry out authentication does not limit the pairing network user of authentication (single capacity card) yet and applies for quantity; Carry out authentication registered network user's phenomenon with regard to existing to claim the identity of others fraudulently; And the network user does not understand how many network identities with his authentication is arranged on a certain website, more can't these network identities be managed, thus the generation that can't stop the uncivil and illegal incidents of many networks.
Summary of the invention
To above-mentioned defective; The present invention provides that a kind of flow process is simple, the network user identity method to set up based on the single capacity authentication of safe ready; It limits single female network identity through authentication; Make female network identity of the network user corresponding one by one with real identity realization, and through realize the variation of single real user network identity in the sub-network identity of single female network identity set inside.
The present invention realizes through following technical scheme: at first website operator gives the network user through authentication and registers unique female network identity; The network user registers a plurality of sub-network identity as required under above-mentioned female network identity then, comes to realize respectively the concrete application function demand of diversified identity; Be separate or resource-sharing between the described sub-network identity, and female network identity can control and management sub-network identity.Because female network identity need pass through network identity validation, and each identification card number can only be registered a female network identity, the situation appearance of therefore having stopped to claim the identity of others fraudulently and having demonstrate,proved the registered network user; The diversified realization of network identity simultaneously realizes through a plurality of sub-network identity under female network identity; Between the different sub network identity through the user be provided with can be separate, carry out resource-sharing partly or completely; The female network identity of one of which can improve fail safe to the restriction of checking; Its more than two sub-network identity can realize that the network user is to the multifarious application need of network identity; It greatly facilitates the network user's needs three through to the setting of the resource-sharing between each child network identity; The setting of a plurality of in addition sub-network identity is managed through female network identity; Such as each child network identity being added, share operations such as data is provided with between modification, deletion or the sub-network identity, but the sub-network identity can not or be operated with the sub-network identity of its sane level female network identity.
According to the network user's actual needs, improve the variation of using, the sub-network identity can also be provided with a plurality of undernet identity, forms the multistage identity of user on network by that analogy.But the network identity of each grade can only carry out control and management through the network identity of upper level, and can not manage the network identity of higher level or sane level.
The login form of undernet identity is can be diversified; Such as female network identity single password is set; Can get into each undernet identity after logining successively operates; Perhaps each undernet identity is provided with different ciphers respectively, and operate at the different different undernet identity interfaces that get into automatically through the input password when landing female network identity, directly logins through input undernet identity and corresponding password thereof again or directly.
Female network identity that the present invention has realized the user is corresponding one by one with real identity; Reduced the generation of the log on user's that claims the identity of others fraudulently phenomenon; For the standard network environment; Hit the network crime and have positive impact, and in restriction single network user identity, can guarantee the variation of user network identity again through multilevel subnetwork network identity; Also can guarantee the controllability of real user through female network identity login back to the management of each undernet identity simultaneously, reduce the generation of falsely using phenomenons such as other people network identity crime a plurality of network identities.
Description of drawings
Fig. 1 is the structural representation of an embodiment of the present invention.
Embodiment
With reference to Fig. 1, a kind of network user identity method to set up based on the single capacity authentication, this status is verified as three grades; After promptly at first opening network, according to website operator (Internet Service Provider) prompting, the network user submits authentication to the personal identification papers; After passing through through client audit, promptly register a female network identity, and this network identity is unique; Its real identity with the network user is corresponding one by one, i.e. the corresponding female network identity of identification card number; The network user is according to self needs then; The a plurality of sub-network identity of registration under female network identity; So that realize user's multinomial application demand; Registration process also will be set authentication (such as password is set), and the user can be set to the form of separate (protection privacy) and resource-sharing (can all share also and can partly share) according to the needs of practical application between a plurality of sub-network identity; Promptly be independent of other network identities such as sub-network identity 1; Sub-network identity 2 is shared photograph album with sub-network identity 3, and sub-network identity 3 is shared photograph album, shared the contact person with sub-network identity 4 with sub-network identity 2, and sub-network identity 4 is shared the contact person with sub-network identity 3; And sub-sub-network identity 1-3 is set under the sub-network identity 1, its method to set up and a plurality of sub-network identity each other is similar, repeats no more.The identity of upper level can be carried out control and management to the identity of next stage; Can the antithetical phrase network identity and operation such as sub-sub-network identity is added, modification, deletion or shared data are provided with such as female network identity, in like manner the sub-network identity also can be carried out above-mentioned management to the sub-sub-network identity of next stage.But the identity of each grade can only perhaps self be carried out control and management through the identity of upper level, and can not manage other identity of higher level or sane level.
Authentication can be set respectively in identity logins at different levels or only female network identity is provided with authentication; Verification method is selected can be diversified, such as login password is set, perhaps binds mobile phone and send identifying code; Forms such as digital certificate perhaps are installed again, just do not enumerate one by one at this.
Be example with the known Tengxun website of present masses below, further the present invention will be described.At first the website is when the user logins this website first; Use (such as mailbox, QQ chat, microblogging, forum etc.) if want the diverse network of participating in this website, need submit application for registration to client, application for registration must be through the checking of identity card; Give the network user a female network application identity after the checking; The form of expression of this identity can be arbitrarily, can be client providing with the machine also can be that user oneself confirms, this identity is corresponding one by one with my identification card number; The user wants to keep the own variation of identity on network, such as different virtual demand such as work, life, amusements according to actual needs then; The user can register a plurality of sub-network identity through client under female network identity; Be respectively applied for different demands, can provide for client such as the sub-network identity different QQ number, the user can be set to work QQ, amusement QQ and life QQ etc. as required; Each QQ number application form can comprise mailbox, microblogging, photograph album etc.; This moment can be according to user's needs, and can be provided with one of them QQ number is fully independently, and its information is shared with other QQ number; With the protection individual privacy, QQ promptly can above-mentionedly be provided with such as work; Other inoperatives QQ such as life QQ, amusement QQ; The resource that the user can be set between two or more arbitrarily QQ is as required all shared or is partly shared; To reach the information resources of utilizing to greatest extent on each QQ, satisfy the maximum application demand of user.In like manner under the sub-network identity sub-sub-network identity can also be set as required; Such as being set to domestic service QQ, overseas operation QQ etc. under the work QQ; By that analogy; Can realize the application of the multistage sub-identity under same female network identity, fail safe has also increased the demand of single network user's multiple network identity when improving.In addition; Female network identity can be managed the sub-identity of subordinate, such as deleting work QQ, increases outdoor QQ; Perhaps adjust the content of resource-sharing between each QQ etc.; Certain female network identity also can antithetical phrase sub-network identity or more the identity of next stage carry out above-mentioned management, but subordinate's identity can not manage higher level's identity, therefore can guarantee the controllability of real user to a plurality of network identities.
Network identities at different levels are specifically logined form can be diversified; Such as female network identity single password is set; Can get into each undernet identity after logining successively operates; Perhaps each undernet identity is provided with different ciphers respectively, and operate at the different different undernet identity interfaces that get into automatically through the input password when landing female network identity, directly logins through input undernet identity and corresponding password thereof again or directly.
The present invention goes for the various websites on the present network, improves the fail safe of network, and makes that the network user's is more convenient to operate; Below only be an exemplary embodiments of the present invention, do not limit to and present embodiment that as long as the simple adjustment that those skilled in the art carry out for such scheme identical with method to set up principle of the present invention, all falls within protection scope of the present invention.
Claims (4)
1. network user identity method to set up based on the single capacity authentication; It is characterized in that; At first website operator gives the network user through ID card verification and registers unique female network identity; The network user registers a plurality of sub-network identity as required under above-mentioned female network identity then, comes to realize respectively the concrete application function demand of diversified network identity; Be separate or resource-sharing between the described sub-application identity, and female network identity can control and management sub-network identity.
2. the network user identity method to set up based on the single capacity authentication according to claim 1; It is characterized in that; The network user can also register a plurality of undernet identity under the sub-network identity; Form the network user's multistage identity by that analogy, and higher level's network identity can control and management undernet identity.
3. the network user identity method to set up based on the single capacity authentication according to claim 1 and 2 is characterized in that, described undernet identity can not be carried out control and management to higher level's network identity or with the network identity of its sane level.
4. the network user identity method to set up based on the single capacity authentication according to claim 3; It is characterized in that; The login form of said undernet identity is: female network identity is provided with single password; Can get into each undernet identity after logining successively operates; Perhaps each undernet identity is provided with different ciphers respectively, and operate at the different different undernet identity interfaces that get into automatically through the input password when landing female network identity, directly logins through input undernet identity and corresponding password thereof again or directly.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210067782.1A CN102546673B (en) | 2012-03-15 | 2012-03-15 | Method for setting network user identity based on single identity authentication |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210067782.1A CN102546673B (en) | 2012-03-15 | 2012-03-15 | Method for setting network user identity based on single identity authentication |
Publications (2)
Publication Number | Publication Date |
---|---|
CN102546673A true CN102546673A (en) | 2012-07-04 |
CN102546673B CN102546673B (en) | 2014-10-08 |
Family
ID=46352631
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201210067782.1A Active CN102546673B (en) | 2012-03-15 | 2012-03-15 | Method for setting network user identity based on single identity authentication |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102546673B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114817938A (en) * | 2021-01-28 | 2022-07-29 | 海信集团控股股份有限公司 | Method and equipment for accessing shared photo album and protecting private pictures of shared photo album |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1917711A (en) * | 2006-08-29 | 2007-02-21 | 中国移动通信集团公司 | Method for processing information of user's ID |
CN1917665A (en) * | 2006-08-29 | 2007-02-21 | 中国移动通信集团公司 | Data association method for mobile terminal in multiple virtual communities |
CN101441734A (en) * | 2007-11-19 | 2009-05-27 | 上海久隆电力科技有限公司 | Unite identification authentication system |
CN101741558A (en) * | 2008-11-12 | 2010-06-16 | 上海长江数码科技有限公司 | Method for realizing uniform identity authentication |
CN102045367A (en) * | 2011-01-10 | 2011-05-04 | 软库创投(北京)科技有限公司 | Registration method and authentication server of real-name authentication |
-
2012
- 2012-03-15 CN CN201210067782.1A patent/CN102546673B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1917711A (en) * | 2006-08-29 | 2007-02-21 | 中国移动通信集团公司 | Method for processing information of user's ID |
CN1917665A (en) * | 2006-08-29 | 2007-02-21 | 中国移动通信集团公司 | Data association method for mobile terminal in multiple virtual communities |
CN101441734A (en) * | 2007-11-19 | 2009-05-27 | 上海久隆电力科技有限公司 | Unite identification authentication system |
CN101741558A (en) * | 2008-11-12 | 2010-06-16 | 上海长江数码科技有限公司 | Method for realizing uniform identity authentication |
CN102045367A (en) * | 2011-01-10 | 2011-05-04 | 软库创投(北京)科技有限公司 | Registration method and authentication server of real-name authentication |
Non-Patent Citations (2)
Title |
---|
刘冰: "在数字化校园中利用Portal和Ldap实现统一身份认证的研究与应用", 《中国优秀硕士论文全文数据库》 * |
黄剑飞: "LDAP在校园网统一身份认证中的应用", 《中国优秀硕士论文全文数据库》 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114817938A (en) * | 2021-01-28 | 2022-07-29 | 海信集团控股股份有限公司 | Method and equipment for accessing shared photo album and protecting private pictures of shared photo album |
CN114817938B (en) * | 2021-01-28 | 2024-05-17 | 海信集团控股股份有限公司 | Method and equipment for accessing shared album and protecting private pictures of shared album |
Also Published As
Publication number | Publication date |
---|---|
CN102546673B (en) | 2014-10-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Yazdinejad et al. | Blockchain-enabled authentication handover with efficient privacy protection in SDN-based 5G networks | |
Wolinsky et al. | Dissent in numbers: Making strong anonymity scale | |
CN105516980B (en) | A kind of wireless sensor network token authentication method based on Restful frameworks | |
US20150288701A1 (en) | Invitation links with enhanced protection | |
CN104580364B (en) | A kind of method and apparatus of resource sharing | |
CN103347020B (en) | A kind of system and method across application authorization access | |
CN103944890A (en) | Virtual interaction system and method based on client/server mode | |
CN104883402A (en) | Information processing method and cloud-end service platform | |
CN103259770A (en) | Login method and login server | |
CN106534082B (en) | User registration method and device | |
CN109067785A (en) | Cluster authentication method, device | |
CN101202631A (en) | System and method for identification authentication based on cipher key and timestamp | |
CN107046577B (en) | Cloud mixing method and system | |
CN108400962A (en) | A kind of Authentication and Key Agreement method under multiserver framework | |
CN103546290B (en) | Third Party Authentication system or method with user group | |
CN105704154B (en) | A kind of service processing method based on RESTful, apparatus and system | |
CN103379093A (en) | Method and device for achieving account intercommunication | |
CN101227477A (en) | Method for implementing subscriber terminal access authentication | |
US9848017B2 (en) | Techniques for identity and policy based routing | |
US20240022414A1 (en) | Authentication of communication session participants using blockchain | |
CN109379339A (en) | A kind of portal authentication method and device | |
CN102546673B (en) | Method for setting network user identity based on single identity authentication | |
CN101247369B (en) | User information expression method, instant communication system and equipment in instant communication | |
WO2020123237A1 (en) | Secure virtual personalized network | |
EP4030687A1 (en) | Authenticating anonymous information |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right |
Effective date of registration: 20180604 Address after: 257091 Software Park 228, South 1 road, Dongcheng, Dongying, Shandong C-201 Patentee after: Dongying Huang Huang Intellectual Property Management Co., Ltd. Address before: 257091 Dongying municipal municipal administration bureau, 276 east two road, Dongying District, Dongying, Shandong Patentee before: Ma Jun |
|
TR01 | Transfer of patent right |