CN104378759A - Users' real name authentication method and system - Google Patents

Users' real name authentication method and system Download PDF

Info

Publication number
CN104378759A
CN104378759A CN201410733826.9A CN201410733826A CN104378759A CN 104378759 A CN104378759 A CN 104378759A CN 201410733826 A CN201410733826 A CN 201410733826A CN 104378759 A CN104378759 A CN 104378759A
Authority
CN
China
Prior art keywords
user
wireless device
information
user profile
certificate server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410733826.9A
Other languages
Chinese (zh)
Inventor
钟建龙
张明振
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fujian Star Net Communication Co Ltd
Original Assignee
Fujian Star Net Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fujian Star Net Communication Co Ltd filed Critical Fujian Star Net Communication Co Ltd
Priority to CN201410733826.9A priority Critical patent/CN104378759A/en
Publication of CN104378759A publication Critical patent/CN104378759A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

An embodiment of the invention provides a users' real name authentication method and system. The method includes that a wireless device of one user reads an identification tag; the identification tag triggers a user information capture device to capture user information; the user information capture device sends the captured user information to an authentication server; if the user information is valid, the wireless device of the user acquires network access account information allocated to the user by the authentication server; or, if the user information is valid, the user information capture device sends the valid user information to the authentication server, and the wireless device of the user acquires the network access account information allocated to the user by the authentication server. The authentication method is convenient and efficient, and demand of human resources for registering real names in the authentication process is lowered effectively.

Description

A kind of user's real name identification method and system
Technical field
The present invention relates to network communication technology field, particularly relate to a kind of user's real name identification method and system.
Background technology
Along with a large amount of growths of various mobile terminal, client uses smart machine online demand in public places increasing, to surf the Net leisure for user in many public places widespread deployment WLAN (wireless local area network) (wifi).In the middle of the WLAN (wireless local area network) of having disposed at present, need to use certain authentication mode, be used for checking subscriber identity information, prevent it from using network to deliver improper speech interference civil order on the net.These existing network authentication techniques, loaded down with trivial details manually the appraising and deciding of most needs could confirm that authentication is passed through, no matter adopt visitor's Verification System or short message certification system, the problem that it all faces " manpower resource consumption is large, O&M cost is high, authentication trustworthiness be difficult to ensure card ".
There are three kinds of following schemes in prior art:
Scheme one: after visitor's (specifying that visitor refers to its personnel in non-living area own herein) arrives public place, usually guide the relevant informations such as registration Guest User name by this place reception personnel.
In above-mentioned authentication mode, visitor reception personnel, by the information of registration visitor, is supplied to visitor's temporary account and surfs the Net by user authentication.In this process, needing professional to receive, to examine user profile, then needing larger cost of human resources, also compare and be difficult to ensure that card user profile is true and reliable.Use the contour class identifiers authentication measures of identity card if strict, then easily cause client dislike and watch out for.After use Quick Response Code is used as certification registration, produce and input efficiency although improve user name password, that still cannot reduce reception personnel checks demand to authenticating user identification.
Scheme two: (1) client removes information desk counsel user name password, attendant provides unified Guest User's name password to surf the Net for certification;
(2) client is after certain shop is consumed, while consumption singles print, print temporary user name password or relevant Quick Response Code authenticated user information.
Scheme three: operator or operator participate in the class public network certification connecting internet system built, this Verification System using phone number or SMS as authentication mode, can accomplish system of real name certification usually.For the WLAN (wireless local area network) that operator provides, usually there is charging attributes.For the short message certification system that businessman uses, although free for user, businessman needs to pay expensive short message certification system operation and maintenance expenses, and cost is high.
Above-mentioned shortcoming of the prior art is: the authentication mode of scheme one and scheme two, owing to cannot check user's real information, does not have real-name authentication feature equally, does not meet the regulation of real-name authentication online.
The authentication mode that corresponding scheme three provides, the short message certification system that businessman uses, although free for user, businessman needs to pay expensive short message certification system operation and maintenance expenses, and cost is high.
Summary of the invention
For the defect of prior art, The embodiment provides a kind of user's real name identification method, the invention provides following scheme: comprising:
The wireless device of user reads identification label;
Described identification label triggers and catches user information appliance seizure user profile;
Caught user profile is sent to certificate server by described seizure user information appliance, if described user profile is effective, it is the networking accounts information that user distributes that the wireless device of user obtains described certificate server; Or,
If described user profile is effective, effective user profile is sent to certificate server by described seizure user information appliance, and it is the networking accounts information that user distributes that the wireless device of user obtains described certificate server.
According to said method of the present invention, comprising: the mode of described reading identification label comprises carries out scan operation to identification label or manually input identification label on the wireless device.
According to said method of the present invention, comprising: the wireless device of described user reads the resource link information that identification label access identification label comprises, triggered catching user information appliance and catch user profile by resource link information.
According to said method of the present invention, comprising: according to the WAP (wireless access point) deployed position of having disposed in wireless network environment, logic association relation that is that set up described WAP (wireless access point) and that catch between user information appliance.
According to said method of the present invention, comprising:
Certificate server receives and stores the user profile that described seizure user information appliance catches, if described user profile is effective, certificate server is that user corresponding to validated user information distributes networking account, and distributed networking account is distributed to consumer wireless device; Or,
Certificate server receives and stores the effective user profile that described seizure user information appliance sends, and certificate server is that user corresponding to validated user information distributes networking account, and distributed networking account is distributed to consumer wireless device.
According to said method of the present invention, described certificate server is, after described user distributes networking account, also comprise:
Set up the MAC Address of consumer wireless device, user profile and for user distribute networking accounts information incidence relation and form log information.
According to said method of the present invention, comprising:
Obtain the MAC Address of request networking user;
Using the MAC Address of the wireless device of the user obtained as search index, according to described incidence relation, whether inquiry exists the user profile be associated with the MAC Address of the wireless device of user, if exist, then direct to consumer wireless device open network rights of using; If do not exist, then to the wireless device pushing certification page of user.
According to said method of the present invention, described certification page comprises: account verification input and information;
If the account verification information that user inputs at described account verification input is corresponding with the accounts information of stored user, then certification is passed through to user;
If the account verification information of user's input is not corresponding with the accounts information of stored user, then user is pointed out to use wireless device to read identification label;
Described information prompting first new user uses wireless device to read identification label.
According to a further aspect in the invention, a kind of user's real-name authentication system is also provided, comprises:
Wireless device, for reading identification label;
Trigger module, triggers for making described identification label and catches user information appliance seizure user profile;
Catch user information appliance, for catching user profile;
Sending module, for sending described seizure user profile to certificate server;
Judge module, for judging that whether described user profile is effective;
Certificate server, for receiving and storing described user profile, or, for receiving and storing described effective user profile; And distribute networking account for user corresponding to validated user information, and distributed networking account is distributed to consumer wireless device.
According to a further aspect in the invention, described certificate server comprises:
Receiver module, for receiving and storing described user profile, or, for receiving and storing described effective user profile;
Distribution module, the legal user of the user profile for judging for judge module distributes networking account;
Distribution module, for being distributed to consumer wireless device by distributed networking account.
According to a further aspect in the invention, described certificate server also comprises:
Relating module, for making certificate server be after user distributes networking account at authentication module, set up the MAC Address of consumer wireless device, user profile and for user distribute networking accounts information incidence relation and form log information.
According to a further aspect in the invention, described certificate server also comprises:
Acquisition module, obtains the MAC Address of request networking user;
Index module, for using the MAC Address of wireless device of the user obtained as search index;
Enquiry module, for according to described incidence relation, inquires about whether there is the user profile be associated with the MAC Address of the wireless device of user;
Executive Module, if enquiry module inquires the user profile existing and be associated with the MAC Address of the wireless device of user, Executive Module is directly to consumer wireless device open network rights of using; If enquiry module does not inquire the user profile existing and be associated with the MAC Address of the wireless device of user, Executive Module is then to the wireless device pushing certification page of user.
The technical scheme provided as can be seen from the embodiment of the invention described above, the embodiment of the present invention reads identification label by the wireless device of user; Described identification label triggers and catches user information appliance seizure user profile; Caught user profile is sent to certificate server by described seizure user information appliance; If described user profile is effective, it is the networking accounts information that user distributes that the wireless device of user obtains described certificate server.Method solve public place real-name authentication problem, a kind of convenient, efficient authentication mode is provided, effectively reduces in verification process the demand of human resources registering real name.
Accompanying drawing explanation
In order to be illustrated more clearly in the technical scheme of the embodiment of the present invention, below the accompanying drawing used required in describing embodiment is briefly described, apparently, accompanying drawing in the following describes is only some embodiments of the present invention, for those of ordinary skill in the art, under the prerequisite not paying creative work, other accompanying drawing can also be obtained according to these accompanying drawings.
The process chart of a kind of user's real name identification method that Fig. 1 provides for the embodiment of the present invention one example one;
The process chart of a kind of user's real name identification method that Fig. 2 provides for the embodiment of the present invention one example two;
The module map of a kind of user's real-name authentication system that Fig. 3 provides for the corresponding example of the embodiment of the present invention two one;
The module map of a kind of user's real-name authentication system that Fig. 4 provides for the corresponding example of the embodiment of the present invention two two.
Embodiment
For ease of the understanding to the embodiment of the present invention, be further explained explanation below in conjunction with accompanying drawing for several specific embodiment, and each embodiment does not form the restriction to the embodiment of the present invention.
Embodiment one
In the present embodiment, for the user by certification, the MAC Address of the built vertical consumer wireless device of certificate server, user profile and the incidence relation of networking accounts information that distributes for user also form log information, certain wireless network covering place is entered when user carries wireless device, need the wireless network accessing this place, user initiates access request to accessible WAP (wireless access point), and certificate server can obtain in wireless network environment IP address and the MAC Address of the wireless device of the user asking to access by WAP (wireless access point), because the identical IP of different time points can distribute to different users, so carry out inquiring user with IP address not there is uniqueness, MAC Address is then the corresponding MAC Address of a consumer wireless device, therefore, preferably, user initiates access request to accessible WAP (wireless access point), obtain the MAC Address of request networking user, using the MAC Address of the wireless device of the user obtained as search index, according to incidence relation, whether inquiry exists the user profile be associated with the MAC Address of the wireless device of user, if exist, then direct to consumer wireless device open network rights of using, if do not exist, then to the wireless device pushing certification page of user.If the account verification information that user inputs at described account verification input is corresponding with the accounts information of stored user, then certification is passed through to user; If the account verification information of user's input is not corresponding with the accounts information of stored user, then user is pointed out to use wireless device to read identification label; Information prompting first new user uses wireless device to read identification label, completing user real-name authentication.
Example one
The handling process present embodiments providing a kind of user's real name identification method as shown in Figure 1, makes new user complete real-name authentication, comprises following treatment step:
The wireless device of step S111, user reads identification label;
Identification label can be the Quick Response Code comprising resource link information, bar code, particular advertisement advertising map etc., identification label comprises resource link information, described resource link information association catches user information appliance, the wireless device of user performs and reads identification label operational access resource link information, triggers the execution of seizure user information appliance catch user profile operation by resource link information.
Those skilled in the art will be understood that above-mentioned Quick Response Code; bar code is only citing; other existing or identification labels comprising resource link information that may occur from now on, as being applicable to the embodiment of the present invention, within also should being included in scope, and are contained in this at this with way of reference.
Read the mode of identification label operation; comprise and identification label is carried out to scan operation, manually inputs the modes such as identification label on the wireless device; but be not limited to the above reading identification label mode of operation enumerated; those skilled in the art will be understood that carrying out scan operation mode to identification label is only citing; the mode of operation of other reading identification labels that are existing or that may occur from now on is as being applicable to the embodiment of the present invention; also within scope should being included in, and this is contained at this with way of reference.
Step S112, described identification label trigger and catch user information appliance seizure user profile;
Dispose the position of each seizure user information appliance according to the WAP (wireless access point) of having disposed in wireless network environment, and set up the logic association relation of WAP (wireless access point) and seizure user information appliance; A WAP (wireless access point) associates one or more information capture device, when associating multiple information capture device, realize multipath Information Monitoring, a such as WAP (wireless access point), an association portrait collecting apparatus and a fingerprint acquisition device are as seizure user information appliance simultaneously, now can realize catching the multinomial user profile of a user.
Identification label is deployed in wireless network environment according to the WAP (wireless access point) of having disposed in wireless network environment, identification label is for Quick Response Code, directly trigger the resource link information that access Quick Response Code comprises after the wireless device scans of user Quick Response Code, triggered catching user information appliance and perform and catch user profile operation by resource link information.
Particularly, Quick Response Code is deployed in wireless network environment according to the WAP (wireless access point) of having disposed in wireless network environment, after wireless device scans Quick Response Code, namely the WAP (wireless access point) region belonging to this Quick Response Code is represented, consumer wireless device performs and reads identification label operation, the resource link information that the WAP (wireless access point) region access Quick Response Code of the direct triggering wireless device of this operation belonging to Quick Response Code comprises, is triggered by resource link information and catches the operation of user information appliance execution seizure user profile.Particularly, such as, the resource link information that Quick Response Code comprises is http://x.x.x.x/abcdef, the server address that x.x.x.x is, abcdef is the character string of certain coded format, concrete meaning is the mark of two-dimension code label, after server receives wireless client initiation http://x.x.x.x/abcdef request, the seizure user information appliance of resolving abcdef mark corresponding catches user profile, for camera as seizure user information appliance, resolve the camera shooting user picture that abcdef mark is corresponding.
Seizure user information appliance is the device distinguishing the characteristic information of other users for catching user, the characteristic information caught can be used for identifying this user, catching user information appliance can be deployed in the portrait devices such as camera in wireless network overlay environment or video camera in advance, also can be user fingerprints extraction element, iris texture extraction device etc., those skilled in the art will be understood that the portrait devices such as above-mentioned camera or video camera, also can be user fingerprints extraction element, iris texture extraction device is only citing, other existing or may be used for of may occurring from now on catch the characteristic information device of user as being applicable to the embodiment of the present invention, also within should being included in scope, and be contained in this at this with way of reference.
Caught user profile is sent to certificate server by step S113, described seizure user information appliance;
Certificate server receives and storing subscriber information.
If the described user profile of step S114 is effective, obtaining described certificate server is the networking accounts information that user distributes.
In this step, be that certificate server first receives and stores user profile, then carry out user profile and whether effectively judge, if described user profile is effective, certificate server is that described user distributes networking account, and distributed networking account is distributed to consumer wireless device; And for invalid user profile, can discard processing.
In addition, for the user by certification, certificate server is set up the MAC Address of consumer wireless device, user profile and the incidence relation of networking accounts information that distributes for user and is formed log information,
Alternatively, a user profile is associated with a log information entry, article one, the content of log information comprises, and the IP address of the wireless device of user, the MAC Address of consumer wireless device, user are by the network entry time after certification and the networking accounts information for user's distribution;
Alternatively, directly associate a user profile and the networking accounts information for user's distribution with the MAC Address of consumer wireless device, be reflected in a log information by MAC Address and associated user profile and the networking accounts information that distributes for user, log information also comprises the IP address of the wireless device of user, user in addition by the network entry time etc. after certification.
On the user profile caught effectively is assert, different and have various criterion according to type of device, if catch the equipment of iris, then be effective with successful acquisition iris, if video camera, then think effective to collect containing personage's picture rich in detail.
The content that log information records can be used for inquiry, such as records the IP address of user and the time of use, uses this IP to carry out the identification of breaking laws and commit crime, and navigate to end user according to stored user profile for tracing.
In addition, using the MAC Address of the wireless device of the user in described log information as search index, according to incidence relation, the user profile that can inquire this user and the accounts information that this user is distributed, server records the MAC Address of this user simultaneously and captures the incidence relation of information, carries out active certification mandate for WAP (wireless access point) during this wireless device online next time according to MAC Address.
Example two
In addition, the handling process present embodiments providing a kind of user's real name identification method as shown in Figure 2, makes new user complete real-name authentication, step S121 is identical with above-mentioned exemplary step S111, step S122 is identical with above-mentioned exemplary step S121, seldom repeats herein, comprises following treatment step:
Step S121, the wireless device of user reads identification label;
Step S122, described identification label triggers and catches user information appliance seizure user profile;
Step S123, if described user profile is effective, effective user profile is sent to certificate server by described seizure user information appliance;
Whether, in this step, first carry out user profile again and effectively judge, if described user profile is effective, effective user profile is sent to certificate server by described seizure user information appliance, and for invalid user profile, can discard processing.
Step S124, it is the networking accounts information that user distributes that the wireless device of user obtains described certificate server.Particularly, be that described user distributes networking account by certificate server, and distributed networking account is distributed to consumer wireless device.
Embodiment two
This embodiment offers a kind of user's real-name authentication system, its specific implementation structure as shown in Figure 2, specifically can comprise following module:
Wireless device 21, for reading identification label;
Trigger module 22, triggers for making described identification label and catches user information appliance seizure user profile;
Catch user information appliance 23, for catching user profile;
Sending module 24, for sending described seizure user profile to certificate server;
Judge module 25, for judging that whether described user profile is effective;
Certificate server 26, for receiving and storing described user profile, or, for receiving and storing described effective user profile;
And distribute networking account for user corresponding to validated user information, and distributed networking account is distributed to consumer wireless device.
Further, judge module 25 can be embedded in certificate server 26 or be embedded in and catches in user information appliance 23 or realize its function with an external hardware module separately;
When judge module 25 is embedded in certificate server 26, as shown in Figure 3, deterministic process is realized according to the method for above-mentioned example one, certificate server 26 receives and stores user profile, carry out user profile at judge module 25 more whether effectively to judge, if described user profile is effective, certificate server 26 distributes networking account for described user, and distributed networking account is distributed to consumer wireless device.
Catch in user information appliance 23 when judge module 25 is embedded in, as shown in Figure 4, deterministic process is realized according to the method for above-mentioned example two, first in judge module 25, carry out user profile whether effectively to judge, if described user profile is effective, effective user profile is sent to certificate server 26 by described seizure user information appliance 23.
When with the independent function realizing judge module 25 with an external hardware module, all can realize deterministic process with the method in above-mentioned example one or example two, but this kind of method cost consumption is large, does not generally adopt.
Further, certificate server 26 comprises:
Receiver module 261, for receiving and storing the user profile that described seizure user information appliance catches;
Distribution module 262, the legal user of the user profile for judging for judge module distributes networking account;
Distribution module 263, for being distributed to consumer wireless device by distributed networking account.
Further, certificate server also comprises:
Relating module 264, for making certificate server be after user distributes networking account at authentication module, set up the MAC Address of consumer wireless device, user profile and for user distribute networking accounts information incidence relation and form log information.
Further, certificate server also comprises:
Acquisition module 265, obtains the MAC Address of request networking user;
Index module 266, for using the MAC Address of wireless device of the user obtained as search index;
Enquiry module 267, for according to described incidence relation, inquires about whether there is the user profile be associated with the MAC Address of the wireless device of user;
Executive Module 268, if enquiry module inquires the user profile existing and be associated with the MAC Address of the wireless device of user, Executive Module is directly to consumer wireless device open network rights of using; If enquiry module does not inquire the user profile existing and be associated with the MAC Address of the wireless device of user, Executive Module is then to the wireless device pushing certification page of user.
Carry out the detailed process of user's real-name authentication with the device of the embodiment of the present invention and preceding method embodiment similar, repeat no more herein.
One of ordinary skill in the art will appreciate that: accompanying drawing is the schematic diagram of an embodiment, the module in accompanying drawing or flow process might not be that enforcement the present invention is necessary.
As seen through the above description of the embodiments, those skilled in the art can be well understood to the mode that the present invention can add required general hardware platform by software and realizes.Based on such understanding, technical scheme of the present invention can embody with the form of software product the part that prior art contributes in essence in other words, this computer software product can be stored in storage medium, as ROM/RAM, magnetic disc, CD etc., comprising some instructions in order to make a computer equipment (can be personal computer, server, or the network equipment etc.) perform the method described in some part of each embodiment of the present invention or embodiment.
Each embodiment in this specification all adopts the mode of going forward one by one to describe, between each embodiment identical similar part mutually see, what each embodiment stressed is the difference with other embodiments.Especially, for device or system embodiment, because it is substantially similar to embodiment of the method, so describe fairly simple, relevant part illustrates see the part of embodiment of the method.Apparatus and system embodiment described above is only schematic, the wherein said unit illustrated as separating component or can may not be and physically separates, parts as unit display can be or may not be physical location, namely can be positioned at a place, or also can be distributed in multiple network element.Some or all of module wherein can be selected according to the actual needs to realize the object of the present embodiment scheme.Those of ordinary skill in the art, when not paying creative work, are namely appreciated that and implement.
The above; be only the present invention's preferably embodiment, but protection scope of the present invention is not limited thereto, is anyly familiar with those skilled in the art in the technical scope that the present invention discloses; the change that can expect easily or replacement, all should be encompassed within protection scope of the present invention.Therefore, protection scope of the present invention should be as the criterion with the protection range of claim.

Claims (12)

1. user's real name identification method, is characterized in that, comprising:
The wireless device of user reads identification label;
Described identification label triggers and catches user information appliance seizure user profile;
Caught user profile is sent to certificate server by described seizure user information appliance, if described user profile is effective, it is the networking accounts information that user distributes that the wireless device of user obtains described certificate server; Or,
If described user profile is effective, effective user profile is sent to certificate server by described seizure user information appliance, and it is the networking accounts information that user distributes that the wireless device of user obtains described certificate server.
2. a kind of user's real name identification method according to claim 1, is characterized in that, the mode of described reading identification label comprises carries out scan operation to identification label or manually input identification label on the wireless device.
3. a kind of user's real name identification method according to claim 2, it is characterized in that, comprise: the wireless device of described user reads the resource link information that identification label access identification label comprises, triggered catching user information appliance and catch user profile by resource link information.
4. a kind of user's real name identification method according to claims 1 to 3, it is characterized in that, comprise: according to the WAP (wireless access point) deployed position of having disposed in wireless network environment, logic association relation that is that set up described WAP (wireless access point) and that catch between user information appliance.
5. user's real name identification method, is characterized in that, comprising:
Certificate server receives and stores the user profile that described seizure user information appliance catches, if described user profile is effective, certificate server is that user corresponding to validated user information distributes networking account, and distributed networking account is distributed to consumer wireless device; Or,
Certificate server receives and stores the effective user profile that described seizure user information appliance sends, and certificate server is that user corresponding to validated user information distributes networking account, and distributed networking account is distributed to consumer wireless device.
6. a kind of user's real name identification method according to claim 5, is characterized in that, described certificate server is, after described user distributes networking account, also comprise:
Set up the MAC Address of consumer wireless device, user profile and for user distribute networking accounts information incidence relation and form log information.
7. a kind of user's real name identification method according to claim 5 or 6, is characterized in that, comprising:
Obtain the MAC Address of request networking user;
Using the MAC Address of the wireless device of the user obtained as search index, according to described incidence relation, whether inquiry exists the user profile be associated with the MAC Address of the wireless device of user, if exist, then direct to consumer wireless device open network rights of using; If do not exist, then to the wireless device pushing certification page of user.
8. a kind of user's real name identification method according to claim 7, it is characterized in that, described certification page comprises: account verification input and information;
If the account verification information that user inputs at described account verification input is corresponding with the accounts information of stored user, then certification is passed through to user;
If the account verification information of user's input is not corresponding with the accounts information of stored user, then user is pointed out to use wireless device to read identification label;
Described information prompting first new user uses wireless device to read identification label.
9. user's real-name authentication system, is characterized in that, comprising:
Wireless device, for reading identification label;
Trigger module, triggers for making described identification label and catches user information appliance seizure user profile;
Catch user information appliance, for catching user profile;
Sending module, for sending described seizure user profile to certificate server;
Judge module, for judging that whether described user profile is effective;
Certificate server, for receiving and storing described user profile, or, for receiving and storing described effective user profile;
And distribute networking account for user corresponding to validated user information, and distributed networking account is distributed to consumer wireless device.
10. a kind of user's real-name authentication system according to claim 9, it is characterized in that, described certificate server, comprising:
Receiver module, for receiving and storing described user profile, or, for receiving and storing described effective user profile;
Distribution module, the legal user of the user profile for judging for judge module distributes networking account;
Distribution module, for being distributed to consumer wireless device by distributed networking account.
11. a kind of user's real-name authentication systems according to claim 10, it is characterized in that, described certificate server, also comprises:
Relating module, for making certificate server be after user distributes networking account at authentication module, set up the MAC Address of consumer wireless device, user profile and for user distribute networking accounts information incidence relation and form log information.
12. a kind of user's real-name authentication systems according to claim 11, it is characterized in that, described certificate server, also comprises:
Acquisition module, obtains the MAC Address of request networking user;
Index module, for using the MAC Address of wireless device of the user obtained as search index;
Enquiry module, for according to described incidence relation, inquires about whether there is the user profile be associated with the MAC Address of the wireless device of user;
Executive Module, if enquiry module inquires the user profile existing and be associated with the MAC Address of the wireless device of user, Executive Module is directly to consumer wireless device open network rights of using; If enquiry module does not inquire the user profile existing and be associated with the MAC Address of the wireless device of user, Executive Module is then to the wireless device pushing certification page of user.
CN201410733826.9A 2014-12-04 2014-12-04 Users' real name authentication method and system Pending CN104378759A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410733826.9A CN104378759A (en) 2014-12-04 2014-12-04 Users' real name authentication method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410733826.9A CN104378759A (en) 2014-12-04 2014-12-04 Users' real name authentication method and system

Publications (1)

Publication Number Publication Date
CN104378759A true CN104378759A (en) 2015-02-25

Family

ID=52557349

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410733826.9A Pending CN104378759A (en) 2014-12-04 2014-12-04 Users' real name authentication method and system

Country Status (1)

Country Link
CN (1) CN104378759A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017020552A1 (en) * 2015-08-05 2017-02-09 上海连尚网络科技有限公司 Method and device for providing access point information of wireless access point
CN109617860A (en) * 2016-01-13 2019-04-12 阿里巴巴集团控股有限公司 The real name identification method and device of account

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7685629B1 (en) * 2009-08-05 2010-03-23 Daon Holdings Limited Methods and systems for authenticating users
CN102594835A (en) * 2012-03-12 2012-07-18 北京建飞科联科技有限公司 Real name authentication method and authentication platform of wireless networks in a wide range of public places
CN104159225A (en) * 2014-09-02 2014-11-19 解芳 Wireless network based real-name registration system management method and system
CN104184589A (en) * 2014-08-26 2014-12-03 重庆邮电大学 Identity authentication method, terminal device and system
CN104185181A (en) * 2014-08-20 2014-12-03 成都千牛信息技术有限公司 WiFi user access control method based on iptables

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7685629B1 (en) * 2009-08-05 2010-03-23 Daon Holdings Limited Methods and systems for authenticating users
CN102594835A (en) * 2012-03-12 2012-07-18 北京建飞科联科技有限公司 Real name authentication method and authentication platform of wireless networks in a wide range of public places
CN104185181A (en) * 2014-08-20 2014-12-03 成都千牛信息技术有限公司 WiFi user access control method based on iptables
CN104184589A (en) * 2014-08-26 2014-12-03 重庆邮电大学 Identity authentication method, terminal device and system
CN104159225A (en) * 2014-09-02 2014-11-19 解芳 Wireless network based real-name registration system management method and system

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017020552A1 (en) * 2015-08-05 2017-02-09 上海连尚网络科技有限公司 Method and device for providing access point information of wireless access point
US10638410B2 (en) 2015-08-05 2020-04-28 Shanghai Lianshang Network Technology Co., Ltd. Method and device for providing access point information of wireless access point
CN109617860A (en) * 2016-01-13 2019-04-12 阿里巴巴集团控股有限公司 The real name identification method and device of account
CN109617860B (en) * 2016-01-13 2021-10-22 创新先进技术有限公司 Real-name authentication method and device for account

Similar Documents

Publication Publication Date Title
CN104574167B (en) Lease processing method, related device and system
CN103488528B (en) A kind of Quick Response Code processing method and processing device based on mobile terminal
CN106710017B (en) Identity verification method, device and system for logistics signing
CN105678872A (en) Entrance guard manage system, authorization method thereof and entrance guard terminal device
CN104504767A (en) Check-in information verification method and system
CN104008325A (en) Mobile phone Wi-Fi network-connecting real name identity authentication platform and method based on two-dimension codes
CN103023900B (en) Identity identifying method based on cloud server end, cloud service system and Cloud Server
CN108510274B (en) Method and device for visual identification of image and two-dimensional code combined verification
CN105117624A (en) Recognition system and method of user system based on face recognition
CN105516085B (en) A kind of system and method managing the interim internet behavior of visitor
CN109829122B (en) Method and device for acquiring service entrance, storage medium and electronic device
US9918223B2 (en) Fingerprint based communication terminal and method, server and method thereof
JP2013097650A (en) Authentication system, authentication method and authentication server
CN107169726A (en) The method and apparatus that a kind of Quick Response Code work attendance is checked card
CN107026813A (en) Access authentication method, system and the portal server of WiFi network
CN109245902A (en) The guard method of instant messaging message authentication codes and device
CN103235923B (en) Obtain the method and device of checking mark
CN107705064A (en) Method, equipment and storage medium are signed in a kind of express delivery
CN106936802A (en) Mobile phone A PP information protecting methods and mobile phone A PP clients, system
CN206274404U (en) A kind of electronic entrance ticket checking system
CN106658498A (en) Portal approved quick roaming method and WiFi device
CN106530412A (en) Electronic ticket verification system
CN103581881B (en) Comprehensive number-obtaining device as well as system and method for obtaining cell phone number of user on network side
CN105635113A (en) SDK-based remote service processing method and system
CN108809969B (en) Authentication method, system and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20150225