CN107196965B - Secure network real name registration method - Google Patents

Secure network real name registration method Download PDF

Info

Publication number
CN107196965B
CN107196965B CN201710538924.0A CN201710538924A CN107196965B CN 107196965 B CN107196965 B CN 107196965B CN 201710538924 A CN201710538924 A CN 201710538924A CN 107196965 B CN107196965 B CN 107196965B
Authority
CN
China
Prior art keywords
website
public security
citizen
organization
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710538924.0A
Other languages
Chinese (zh)
Other versions
CN107196965A (en
Inventor
张艳洁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yantai University
Original Assignee
Yantai University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yantai University filed Critical Yantai University
Priority to CN201710538924.0A priority Critical patent/CN107196965B/en
Publication of CN107196965A publication Critical patent/CN107196965A/en
Application granted granted Critical
Publication of CN107196965B publication Critical patent/CN107196965B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/1066Session management
    • H04L65/1073Registration or de-registration
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Business, Economics & Management (AREA)
  • General Business, Economics & Management (AREA)
  • Multimedia (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Storage Device Security (AREA)

Abstract

The invention realizes a secure network real-name registration technology, and applies a series of data encryption, digital signature and identity authentication information security technologies to ensure that a website subjected to real-name registration can only identify the authenticity of the personal identity of a user, but cannot crack to obtain the real identity information of the user, thereby effectively avoiding various potential safety hazards possibly brought by website information leakage once. When a user transacts network real-name registration, the identity authentication between the user and the website is realized, namely, the website firstly needs to verify the identity validity of the user and then verifies the identity validity of the user to the website, so that the false website is prevented from illegally acquiring the personal information of the user, and the user is prevented from using the false information to register in the legal website. If the registered user generates disputes or is involved with legal problems in the network use process, the true identity of the user can be completely acquired by using the registered registration ciphertext information only under the participation of public security organs.

Description

Secure network real name registration method
Technical Field
The invention relates to a network information security technology in the technical field of computers, in particular to a secure network real-name registration method adopting data encryption and identity authentication technologies.
Background
Generally, a user needs to fill in information such as a user name, a password, a telephone number or a mailbox when registering in a website, and since the information cannot be used for accurately identifying the real identity of a person, various false information and even malicious information are rapidly spread through a network while people enjoy the convenience of network information transmission and communication, so that a series of security problems and social problems are caused. For example, for the case of telecommunication fraud which is endlessly layered, the state-related department clearly specifies that the mobile phone user must be registered with a real name. In the long run, the real-name registration of the user is an important measure for strengthening network supervision and preventing citizens from wandering away from the law margin, and the method plays a positive role in maintaining normal and stable network order and gradually expands the popularization aspect. However, real-name registration requires a user to accurately fill in sensitive information such as personal names, identification numbers, home addresses or work units, and the like, and because the information belongs to the privacy of citizens, the security of the information is greatly concerned by people, the consequences are difficult to predict once information leakage occurs, and particularly at the present day when the network security incident is endless, the real-name registration increases the emotional conflict of people.
The current network real name registration verifies the real identity information of the user by a website or an organization authorized by the state, the verified user opens the corresponding network function, and the real name registration information is independently stored. When a user needs to perform real-name registration at a plurality of different websites, the distributed real-name registration information management method can greatly increase the risk of information leakage. In addition, there are a series of contradictions between users and websites in the network real-name registration implementation process. For a user, how to ensure that a website is a legal website is avoided, information leakage caused by filling personal information in a fake website is avoided, and how to eliminate the worry of the user on the safety of real-name registration information; for a website, how to effectively verify the authenticity of user real-name registration information, the website needs to spend a lot of time and energy to verify the authenticity of the user registration information, so as to prevent a user from filling false personal real-name information, how to reduce the safety burden of storing and managing user sensitive personal privacy information by the website is a practical problem which is difficult to solve, and the development of the network is limited to a certain extent.
Disclosure of Invention
The invention aims at the actual problems which need to be solved urgently, namely the technical problems existing in distributed real-name registration, the technical problem of how to confirm whether a website is legal for a user, the technical problem of how to verify the authenticity of a registered user by the website, the technical problem of how to reduce the safety burden of storing sensitive information by the website, and the like. The method introduces a national public security organ with authoritative public trust in the concrete implementation process, the public security organ masters the detailed personal identity information of all legal citizens in the country, the real validity of the citizen identity can be verified, and the public key possessed by the public security organ is K GPThe private key is K GS. In order to further realize the safety management of the identity of the citizen in the network environment, all legal citizens can be required to apply for registering a password bound with the personal identity number from the public security organ, and the password is secret to a third party and cannot be freely revealed.
For websites or administrative agencies which need to record user real-name registration information, public security agencies verify the identity authenticity of the websites, and all websites which need to register network real-name registration need to register in the public security agencies first, so as to ensure that the user registration business which is engaged in is supervised by law enforcement departments, and the legality is guaranteed. The legally compliant website is distributed with a unique website number with an identity identification function by a public security organization, the number is disclosed to all browsing users of the website, and the citizen can inquire and verify the authenticity of the number at the website of the public security organization.
Because the real-name registration information recorded by the website is extremely sensitive and closely related to the personal privacy of the user, the safety of data storage and management is widely concerned by people, in order to avoid potential safety hazards caused by various information leakage, the invention technically realizes the decentralized management of the citizen identity information and the network registration information, the non-sensitive network registration information such as user name and password is stored independently by the website, but the real citizen identity information registered by the real name of the user is authenticated and signed by the public security organization, the information security technology is adopted to establish the relation between the two, thereby realizing that when the citizen registers in the network real name, what remains at the web site is the personal identity ciphertext that is certified by the public security agency, which the web site may use to verify the authenticity of the registered user, but the specific identity information of the user can not be known, so that the centralized safety management of the citizen identity information at the public security organs is realized. When the website needs to acquire the real identity of a certain registered user, the identity ciphertext information left by the user on the website can be submitted to the public security agency, and the public security agency can confirm the real identity of the user through verification, so that no obstacle is caused to law enforcement of the public security agency.
The new network real-name registration method provided by the invention effectively realizes the security of network real-name registration and avoids the risk of information leakage in distributed real-name registration.
The network real name registration technical effect is as follows: for the network registered user, because the website firstly carries out identity authentication on the user in the registration process, the possibility that a fake and forged website falsely acts as a legal website to illegally obtain the real name information of the user is eliminated, and meanwhile, because the real name registration information recorded by the website cannot be decrypted by anyone under the condition that no public security organ intervenes, the safety of the important private information of the user is effectively protected; for the website, as the identity legitimacy of all registered users can be verified by a public security organization with authoritative public credibility, the real-name information recorded by the website is real and effective, the manpower and material resource cost for verifying the real identity of the user by the website is greatly saved, as the technology eliminates various safety doubts of the user in the traditional real-name registration process, the participation consciousness and acceptance degree of actively accepting real-name registration can be improved, the promotion effect on the wide popularization of the imperative network safety requirement is realized, and the win-win situation of the user and the website is realized.
Detailed Description
A method for registering and registering real name of safety network features that a national public security organ with authoritative public trust is introduced, which has the detailed personal identity information of all legal citizens in the whole country and has a public key K GPAnd a private key K GSWherein the public key K GPExternally public, private key K GSOnly public security authorities know;
at the same time, all legal citizens A apply for registration of the secret key K bound with the personal identification number to the public security organ A,K AIs a key used in the data encryption process and is known only to both citizen A and the public security agency A
For the website or mechanism W needing to record the registration information of the real name registration of the user, firstly registering and registering in the public security organization, then verifying the identity authenticity of the website or mechanism W by the public security organization, and distributing the identity ID of the website or mechanism W with the unique identity function by the public security organization after verification WAnd with the identity ID WBound key K W,ID WThe key K is published externally and can be inquired and verified at the website of the public security institution WOnly W and public security agencies know;
the real-name registration step is as follows,
in the first step, citizen A visits a website or institution W requiring real-name registration, orVisiting the website of the public security organization to obtain the ID issued by the public security organization W
Secondly, the citizen A sends a registration request T of real name registration to the website of the public security organization A
Figure BDA0001341377380000041
Wherein the symbol | | indicates that two adjacent pieces of information are spliced together, ID AThe ID card number of the citizen A is used as the ID card number of the citizen A, the ID card number E is a data encryption algorithm agreed by the two parties in advance, and the data encryption algorithm E is known by the public;
thirdly, the public security organization receives T AThen, the ID card number ID of the citizen A is selected from the internal database ARetrieving a key K associated therewith AThen use K AWill be provided with
Figure BDA0001341377380000042
Decrypting to obtain ID A||ID WWherein ID AIs T AThen the public security organization finds the identity ID from all the website databases registered in the public security organization WKey K of W
Fourthly, the public security organization generates a real-name registration authentication certificate T for the citizen A,
Figure BDA0001341377380000051
wherein,
Figure BDA0001341377380000052
Figure BDA0001341377380000053
k is a secret key distributed by the public security organization, Time is a timestamp and is used for indicating the application date and the valid Time of T, meanwhile, the Time and the secret key K are bound to be valid, and then the public security organization sends a ciphertext T to a citizen A;
fifthly, after receiving T, citizen A uses the key K mastered by citizen A ADecrypting T to obtain m 1And citizen A from m 1To obtain a secret key K distributed by a public security authority and to use its private secret key K by the public security authority GSSignature result on secret key K
Figure BDA0001341377380000055
Sixthly, the real-name registration authentication certificate T generated by the public security organization held by the citizen A is registered in the real-name registration of the website or the organization W, firstly, the ciphertext is registered
Figure BDA0001341377380000056
Sending the result to a website or a mechanism W, then waiting for the website or the mechanism W to confirm the legality of the website or the mechanism W to citizen A,
web site or organization W uses K WDecryption
Figure BDA0001341377380000057
Then m is obtained 2From m 2To obtain the public key K used by the public security organization GPEncrypted user true identity ciphertext
Figure BDA0001341377380000058
The web site or institution W then uses the public key K of the public security agency GPWill be provided with
Figure BDA0001341377380000059
Decrypting to obtain key K distributed by public security organization, randomly generating an integer n with more than four digits by website or organization W, and generating verification code V ═ E K[n]Then the web site or organization W will
Figure BDA00013413773800000510
Displaying the real name registration page and the user registration page on the user registration page simultaneously, and waiting for the registration of the real name registration of the user A;
seventhly, citizen A displays the web site or organization W page
Figure BDA00013413773800000511
Obtained by decrypting T with itself
Figure BDA00013413773800000512
Comparing and verifying whether the two are consistent, and if the two are consistent, confirming the legality of the website or the mechanism W;
citizen a then uses K to set V ═ E K[n]Decrypting to obtain n, and filling the registration information selected by the user A at the website or the organization W and the n into a registration page and submitting the registration page;
eighthly, after receiving the registration information of the citizen A, the website or the mechanism W firstly verifies whether the verification code n submitted by the A is correct or not, if the verification code n is correct, the true validity of the identity of the citizen A is confirmed, and then the website or the mechanism W verifies that the identity of the citizen A is true or not
Figure BDA0001341377380000061
The real name registration information as A is recorded in the website user database together with other registration information, and the citizen A completes the real name registration process.
If the citizen A has illegal behaviors at the website or the organization W, the website or the organization W will execute the illegal behaviors
Figure BDA0001341377380000062
Informing the public security agency that the public security agency uses the private key K GSDecryption
Figure BDA0001341377380000063
The true personal identity of citizen a is obtained.
Preferably, E is a commercial encryption algorithm, such as AES algorithm, or an encryption algorithm specifically designed by public security agencies.
The present invention is described with reference to a specific embodiment of a website or organization W registered with a real name of citizen a, which is described below.
The first step is that the citizen A accesses the website of the public security organization or accesses the website or organization which needs real name registration and registration, here denoted as W, and obtains the ID issued by the public security organization W
The second step is that the citizen A sends a real name registration request to the website of the public security organization:
Figure BDA0001341377380000064
the symbol | | | here denotes the concatenation of two adjacent pieces of information together, ID AIs ID card number of citizen A, E represents a certain data encryption algorithm agreed by both parties in advance, in this example, E is AES algorithm, K AIs a key used in the data encryption process and is known only by both a and the public security agency;
third, the public security organization receives T AThen, the ID card number ID of the citizen A is selected from the internal database ARetrieving a key K associated therewith AUsing K AWill be provided with
Figure BDA0001341377380000065
Decrypting can obtain the ID A||ID WWherein ID AAs T AThen finding the ID from all the registered website databases registered in the public security institution WKey K of W
The fourth step public security organ generates a real-name registration authentication voucher for the citizen A: wherein
Figure BDA0001341377380000067
The Time is a timestamp used for indicating the application date and the effective Time of the T, and then the ciphertext T is sent to the citizen A, so that the T can be generated in a two-dimensional code mode conveniently;
after receiving T, the fifth step citizen A can use the key K grasped by the citizen A ADecrypting T to obtain m 1And
Figure BDA0001341377380000071
citizen A can be selected from m 1To obtain a secret key K distributed by the public security authority and to use its private key K by the public security authority GSSignature result on secret key K Since the key K is bound to the timestamp Time, it is only valid the next Time,
Figure BDA0001341377380000073
is that the public security organization uses the secret key K WEncrypt the generated ciphertext because A does not know the secret key K WSo m cannot be decrypted 2
Sixth step, when the real name registration authentication certificate T generated by the public security organization held by citizen A is registered in the real name registration of the website W, the cipher text is firstly input
Figure BDA0001341377380000074
And then waiting for the website to firstly confirm the legality of the website W to the website A, and preventing the phishing website and the website which is not authenticated by the public security organization from illegally acquiring the personal information of the user. Since the secret key K is only known to the real web site W WUsing K WDecryption
Figure BDA0001341377380000075
M can then be obtained 2From m 2Can obtain the public key K used by the public security organization GPEncrypted user true identity ciphertext
Figure BDA0001341377380000076
Because the website W does not know the private key K of the public security organization GSSo that it cannot decrypt The real ID number ID of the A cannot be known A. Public key K of public security organization used by website W GPWill be provided with
Figure BDA0001341377380000078
The decryption can obtain a secret key K distributed by public security organization, then a random integer n with more than four bits is selected to generate V-E K[n]As the verification code, will
Figure BDA0001341377380000079
Displaying the real name registration page and the real name registration page on a user registration page simultaneously, and waiting for the completion of the real name registration of the user A;
seventh step citizen A displays the web site W page
Figure BDA00013413773800000710
Obtained by decrypting T with itself
Figure BDA00013413773800000711
The comparison and verification are carried out, because anyone except the public security organization cannot forge the signature
Figure BDA00013413773800000712
Therefore, if the two are consistent, the website W is a legal website authenticated by the public security organization, so that the website firstly verifies the validity of the website to the citizen a. Since a already obtained K in the fifth step, a uses K to convert V to E K[n]Decrypting to obtain n, and A filling the registration information selected by the user at the website W and the n on a registration page together to click and submit;
eighth step, after receiving registration information of citizen a, website W first verifies whether verification code n submitted by a is correct, since only real citizen a can decrypt V ═ E using secret key K in fourth step K[n]Therefore, citizen A verifies the real legality of self identity to website W, and W will
Figure BDA00013413773800000713
The real name registration information as A and other registration information are recorded in a website user database, and the citizen A finishes the real name registration process;
ninth, if the citizen A has illegal behavior at the site W, W only needs to be matched
Figure BDA0001341377380000081
Informing the public security authority that the public security authority uses the private key K which is only mastered by the public security authority itself GSDecryption
Figure BDA0001341377380000082
The true personal identity of citizen a can be obtained.
The technology realized by the invention effectively protects the respective information safety through the identity authentication between the website and the real-name registration user, and simultaneously provides convenience for the intervention investigation of public security organs at necessary time.
Although the preferred embodiments of the present invention have been described in detail, the present invention is not limited to the details of the embodiments, and various equivalent modifications can be made within the technical spirit of the present invention, and the scope of the present invention is also within the scope of the present invention.
It should be noted that, in the above embodiments, the various features described in the above embodiments may be replaced or combined in any suitable manner without departing from the scope of the present invention. The invention is not described in detail in order to avoid unnecessary repetition.

Claims (4)

1. A secure network real name registration method is characterized in that,
the method introduces a national public security agency with authoritative public trust, and the public security agency masters the detailed personal identity information of all legal citizens in the country and has a public key K GPAnd a private key K GSWherein the public key K GPExternally public, private key K GSOnly public security authorities know;
at the same time, all legal citizens A apply for registration of the secret key K bound with the personal identification number to the public security organ A,K AIs a key used in the data encryption process and is known only to both citizen A and the public security agency A
For the website or mechanism W needing to record the registration information of the real name registration of the user, firstly registering and registering in the public security organization, then verifying the identity authenticity of the website or mechanism W by the public security organization, and distributing the identity ID of the website or mechanism W with the unique identity function by the public security organization after verification WAnd with the identity ID WBound key K W,ID WThe key K is published externally and can be inquired and verified at the website of the public security institution WOnly W and public security agencies know;
the real-name registration step is as follows,
firstly, a citizen A accesses a website or a mechanism W which needs real-name registration or accesses a website of a public security organization to acquire an identification ID issued by the public security organization W
Secondly, the citizen A sends a registration request T of real name registration to the website of the public security organization A
Figure FDA0002218218200000011
Wherein the symbol | | indicates that two adjacent pieces of information are spliced together, ID AThe ID card number of the citizen A is used as the ID card number of the citizen A, the ID card number E is a data encryption algorithm agreed by the two parties in advance, and the data encryption algorithm E is known by the public;
thirdly, the public security organization receives T AThen, the ID card number ID of the citizen A is selected from the internal database ARetrieving a key K associated therewith AThen use K AWill be provided with
Figure FDA0002218218200000012
Decrypting to obtain ID A‖ID WWherein ID AIs T AThen the public security organization finds the identity ID from all the website databases registered in the public security organization WKey K of W
Fourthly, the public security organization generates a real-name registration authentication certificate T for the citizen A,
Figure FDA0002218218200000013
wherein,
Figure FDA0002218218200000014
Figure FDA0002218218200000015
k isThe Time is a timestamp and is used for indicating the application date and the valid Time of the T, and meanwhile, the Time and the key K are bound to be valid at the same Time, and then the public security organization sends the authentication certificate T to the citizen A;
fifthly, after receiving T, citizen A uses the key K mastered by citizen A ADecrypting T to obtain m 1And
Figure FDA0002218218200000016
citizen A from m 1To obtain a secret key K distributed by a public security authority and to use its private secret key K by the public security authority GSSignature result on secret key K
Figure FDA0002218218200000017
Sixthly, the real-name registration authentication certificate T generated by the public security organization held by the citizen A is registered in the real-name registration of the website or the organization W, firstly, the ciphertext is registered
Figure FDA0002218218200000021
Sending the result to a website or a mechanism W, then waiting for the website or the mechanism W to confirm the legality of the website or the mechanism W to citizen A,
web site or organization W uses K WDecryption
Figure FDA0002218218200000022
Then m is obtained 2From m 2To obtain the public key K used by the public security organization GPEncrypted user true identity ciphertext
Figure FDA0002218218200000023
The web site or institution W then uses the public key K of the public security agency GPWill be provided with
Figure FDA0002218218200000024
Decrypting to obtain key K distributed by public security organization, randomly generating an integer n with more than four digits by website or organization W, and generating verification code V ═ E K[n]Then the web site or organization W will
Figure FDA0002218218200000025
Displaying the real name registration page and the real name registration page on a user registration page simultaneously, and waiting for the completion of the real name registration of the user A;
seventhly, citizen A displays the web site or organization W page
Figure FDA0002218218200000026
Obtained by decrypting T with itself
Figure FDA0002218218200000027
Comparing and verifying whether the two are consistent, and if the two are consistent, confirming the legality of the website or the mechanism W;
citizen a then uses K to set V ═ E K[n]Decrypting to obtain n, and filling the registration information selected by the user A at the website or the organization W and the n into a registration page and submitting the registration page;
eighthly, after receiving the registration information of the citizen A, the website or the mechanism W firstly verifies whether the verification code n submitted by the A is correct or not, if the verification code n is correct, the true validity of the identity of the citizen A is confirmed, and then the website or the mechanism W verifies that the identity of the citizen A is true or not
Figure FDA0002218218200000028
The real name registration information as A is recorded in the website user database together with other registration information, and the citizen A completes the real name registration process.
2. The method of claim 1, wherein if the citizen A has illegal activity at the website or organization W, the website or organization W will execute the illegal activity
Figure FDA0002218218200000029
Informing the public security agency that the public security agency uses the private key K GSDecryption
Figure FDA00022182182000000210
Obtaining trueness of citizen AThe identity of the individual.
3. Method according to claim 1 or 2, characterized in that the encryption algorithm E is the AES algorithm.
4. The method of claim 3, wherein T is generated as a two-dimensional code.
CN201710538924.0A 2017-07-04 2017-07-04 Secure network real name registration method Active CN107196965B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710538924.0A CN107196965B (en) 2017-07-04 2017-07-04 Secure network real name registration method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710538924.0A CN107196965B (en) 2017-07-04 2017-07-04 Secure network real name registration method

Publications (2)

Publication Number Publication Date
CN107196965A CN107196965A (en) 2017-09-22
CN107196965B true CN107196965B (en) 2020-02-11

Family

ID=59881794

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710538924.0A Active CN107196965B (en) 2017-07-04 2017-07-04 Secure network real name registration method

Country Status (1)

Country Link
CN (1) CN107196965B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108696508A (en) * 2018-04-11 2018-10-23 于志 System and method based on CN39 code authentication resident identification card numbers
CN108959883B (en) * 2018-06-25 2021-07-09 兴唐通信科技有限公司 Network identity real-name authentication method based on quick response matrix code
CN112733096B (en) * 2019-10-14 2024-02-27 深圳市红砖坊技术有限公司 User registration method, user login method and corresponding device

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2005017645A2 (en) * 2003-08-14 2005-02-24 Jay-Yeob Hwang Method of service to authenticate the person himself
WO2013150147A1 (en) * 2012-04-05 2013-10-10 Dunbridge Limited Authentication in computer networks
CN103401686A (en) * 2013-07-31 2013-11-20 陕西海基业高科技实业有限公司 User Internet identity authentication system and application method thereof
CN104683306A (en) * 2013-12-03 2015-06-03 中国人民公安大学 Safe and controllable internet real-name certification mechanism
CN104683307A (en) * 2013-12-03 2015-06-03 中国人民公安大学 Internet real-name authentication method based on temporary certificate
CN105681047A (en) * 2016-03-25 2016-06-15 中国互联网络信息中心 CA certificate issuance method and system
CN106850693A (en) * 2017-03-31 2017-06-13 深圳微众税银信息服务有限公司 The method and real-name authentication system of a kind of real-name authentication

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2005017645A2 (en) * 2003-08-14 2005-02-24 Jay-Yeob Hwang Method of service to authenticate the person himself
WO2013150147A1 (en) * 2012-04-05 2013-10-10 Dunbridge Limited Authentication in computer networks
CN103401686A (en) * 2013-07-31 2013-11-20 陕西海基业高科技实业有限公司 User Internet identity authentication system and application method thereof
CN104683306A (en) * 2013-12-03 2015-06-03 中国人民公安大学 Safe and controllable internet real-name certification mechanism
CN104683307A (en) * 2013-12-03 2015-06-03 中国人民公安大学 Internet real-name authentication method based on temporary certificate
CN105681047A (en) * 2016-03-25 2016-06-15 中国互联网络信息中心 CA certificate issuance method and system
CN106850693A (en) * 2017-03-31 2017-06-13 深圳微众税银信息服务有限公司 The method and real-name authentication system of a kind of real-name authentication

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
网络实名制的隐私保护研究;程琳;《信息安全与通信保密》;20131110;第1-5页 *

Also Published As

Publication number Publication date
CN107196965A (en) 2017-09-22

Similar Documents

Publication Publication Date Title
US10979418B2 (en) Template-based distributed certificate issuance in a multi-tenant environment
CN107566116B (en) Method and apparatus for digital asset weight registration
US11100743B1 (en) Blockchain-based election system
CN110874464A (en) Method and equipment for managing user identity authentication data
JP4625234B2 (en) User certificate / private key assignment in token-enabled public key infrastructure system
JP6543040B2 (en) System and method for remote access, remote digital signature
US20170147808A1 (en) Tokens for multi-tenant transaction database identity, attribute and reputation management
CN107196966A (en) The identity identifying method and system of multi-party trust based on block chain
AU2007286004B2 (en) Compliance assessment reporting service
CN109039655A (en) Real name identity identifying method and device, identity block chain based on block chain
CN108684041A (en) The system and method for login authentication
CN106230784A (en) A kind of device authentication method and device
Symeonidis et al. Keyless car sharing system: A security and privacy analysis
JP2003234729A (en) Revocation and updating of token in public key infrastructure system
CN112733121B (en) Data acquisition method, device, equipment and storage medium
CN106936588A (en) A kind of trustship method, the apparatus and system of hardware controls lock
CN102769623A (en) Two-factor authentication method based on digital certificate and biological identification information
CN107196965B (en) Secure network real name registration method
CN111444492A (en) Digital identity verification method based on medical block chain
Guo et al. Using blockchain to control access to cloud data
CN115396096A (en) Encryption and decryption method and protection system for secret file based on national cryptographic algorithm
CN113158250B (en) Privacy protection network car booking method and system for eliminating once-matched drivers
CN113783690B (en) Authentication-based bidding method and device
Al-Rawy et al. A design for blockchain-based digital voting system
KR20080012641A (en) The security method for authentication by substitutive symbol of the residence registration number in internet environment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant