CN107196965B - Secure network real name registration method - Google Patents
Secure network real name registration method Download PDFInfo
- Publication number
- CN107196965B CN107196965B CN201710538924.0A CN201710538924A CN107196965B CN 107196965 B CN107196965 B CN 107196965B CN 201710538924 A CN201710538924 A CN 201710538924A CN 107196965 B CN107196965 B CN 107196965B
- Authority
- CN
- China
- Prior art keywords
- website
- public security
- citizen
- organization
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 23
- 210000000056 organ Anatomy 0.000 claims abstract description 12
- 230000008520 organization Effects 0.000 claims description 65
- 238000012795 verification Methods 0.000 claims description 12
- 230000000694 effects Effects 0.000 claims description 4
- 238000005516 engineering process Methods 0.000 abstract description 7
- 238000007726 management method Methods 0.000 description 4
- 230000006399 behavior Effects 0.000 description 3
- 230000005540 biological transmission Effects 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 238000013523 data management Methods 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000002996 emotional effect Effects 0.000 description 1
- 238000011835 investigation Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000005728 strengthening Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements, protocols or services for supporting real-time applications in data packet communication
- H04L65/1066—Session management
- H04L65/1073—Registration or de-registration
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Power Engineering (AREA)
- Business, Economics & Management (AREA)
- General Business, Economics & Management (AREA)
- Multimedia (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Storage Device Security (AREA)
Abstract
The invention realizes a secure network real-name registration technology, and applies a series of data encryption, digital signature and identity authentication information security technologies to ensure that a website subjected to real-name registration can only identify the authenticity of the personal identity of a user, but cannot crack to obtain the real identity information of the user, thereby effectively avoiding various potential safety hazards possibly brought by website information leakage once. When a user transacts network real-name registration, the identity authentication between the user and the website is realized, namely, the website firstly needs to verify the identity validity of the user and then verifies the identity validity of the user to the website, so that the false website is prevented from illegally acquiring the personal information of the user, and the user is prevented from using the false information to register in the legal website. If the registered user generates disputes or is involved with legal problems in the network use process, the true identity of the user can be completely acquired by using the registered registration ciphertext information only under the participation of public security organs.
Description
Technical Field
The invention relates to a network information security technology in the technical field of computers, in particular to a secure network real-name registration method adopting data encryption and identity authentication technologies.
Background
Generally, a user needs to fill in information such as a user name, a password, a telephone number or a mailbox when registering in a website, and since the information cannot be used for accurately identifying the real identity of a person, various false information and even malicious information are rapidly spread through a network while people enjoy the convenience of network information transmission and communication, so that a series of security problems and social problems are caused. For example, for the case of telecommunication fraud which is endlessly layered, the state-related department clearly specifies that the mobile phone user must be registered with a real name. In the long run, the real-name registration of the user is an important measure for strengthening network supervision and preventing citizens from wandering away from the law margin, and the method plays a positive role in maintaining normal and stable network order and gradually expands the popularization aspect. However, real-name registration requires a user to accurately fill in sensitive information such as personal names, identification numbers, home addresses or work units, and the like, and because the information belongs to the privacy of citizens, the security of the information is greatly concerned by people, the consequences are difficult to predict once information leakage occurs, and particularly at the present day when the network security incident is endless, the real-name registration increases the emotional conflict of people.
The current network real name registration verifies the real identity information of the user by a website or an organization authorized by the state, the verified user opens the corresponding network function, and the real name registration information is independently stored. When a user needs to perform real-name registration at a plurality of different websites, the distributed real-name registration information management method can greatly increase the risk of information leakage. In addition, there are a series of contradictions between users and websites in the network real-name registration implementation process. For a user, how to ensure that a website is a legal website is avoided, information leakage caused by filling personal information in a fake website is avoided, and how to eliminate the worry of the user on the safety of real-name registration information; for a website, how to effectively verify the authenticity of user real-name registration information, the website needs to spend a lot of time and energy to verify the authenticity of the user registration information, so as to prevent a user from filling false personal real-name information, how to reduce the safety burden of storing and managing user sensitive personal privacy information by the website is a practical problem which is difficult to solve, and the development of the network is limited to a certain extent.
Disclosure of Invention
The invention aims at the actual problems which need to be solved urgently, namely the technical problems existing in distributed real-name registration, the technical problem of how to confirm whether a website is legal for a user, the technical problem of how to verify the authenticity of a registered user by the website, the technical problem of how to reduce the safety burden of storing sensitive information by the website, and the like. The method introduces a national public security organ with authoritative public trust in the concrete implementation process, the public security organ masters the detailed personal identity information of all legal citizens in the country, the real validity of the citizen identity can be verified, and the public key possessed by the public security organ is K
GPThe private key is K
GS. In order to further realize the safety management of the identity of the citizen in the network environment, all legal citizens can be required to apply for registering a password bound with the personal identity number from the public security organ, and the password is secret to a third party and cannot be freely revealed.
For websites or administrative agencies which need to record user real-name registration information, public security agencies verify the identity authenticity of the websites, and all websites which need to register network real-name registration need to register in the public security agencies first, so as to ensure that the user registration business which is engaged in is supervised by law enforcement departments, and the legality is guaranteed. The legally compliant website is distributed with a unique website number with an identity identification function by a public security organization, the number is disclosed to all browsing users of the website, and the citizen can inquire and verify the authenticity of the number at the website of the public security organization.
Because the real-name registration information recorded by the website is extremely sensitive and closely related to the personal privacy of the user, the safety of data storage and management is widely concerned by people, in order to avoid potential safety hazards caused by various information leakage, the invention technically realizes the decentralized management of the citizen identity information and the network registration information, the non-sensitive network registration information such as user name and password is stored independently by the website, but the real citizen identity information registered by the real name of the user is authenticated and signed by the public security organization, the information security technology is adopted to establish the relation between the two, thereby realizing that when the citizen registers in the network real name, what remains at the web site is the personal identity ciphertext that is certified by the public security agency, which the web site may use to verify the authenticity of the registered user, but the specific identity information of the user can not be known, so that the centralized safety management of the citizen identity information at the public security organs is realized. When the website needs to acquire the real identity of a certain registered user, the identity ciphertext information left by the user on the website can be submitted to the public security agency, and the public security agency can confirm the real identity of the user through verification, so that no obstacle is caused to law enforcement of the public security agency.
The new network real-name registration method provided by the invention effectively realizes the security of network real-name registration and avoids the risk of information leakage in distributed real-name registration.
The network real name registration technical effect is as follows: for the network registered user, because the website firstly carries out identity authentication on the user in the registration process, the possibility that a fake and forged website falsely acts as a legal website to illegally obtain the real name information of the user is eliminated, and meanwhile, because the real name registration information recorded by the website cannot be decrypted by anyone under the condition that no public security organ intervenes, the safety of the important private information of the user is effectively protected; for the website, as the identity legitimacy of all registered users can be verified by a public security organization with authoritative public credibility, the real-name information recorded by the website is real and effective, the manpower and material resource cost for verifying the real identity of the user by the website is greatly saved, as the technology eliminates various safety doubts of the user in the traditional real-name registration process, the participation consciousness and acceptance degree of actively accepting real-name registration can be improved, the promotion effect on the wide popularization of the imperative network safety requirement is realized, and the win-win situation of the user and the website is realized.
Detailed Description
A method for registering and registering real name of safety network features that a national public security organ with authoritative public trust is introduced, which has the detailed personal identity information of all legal citizens in the whole country and has a public key K
GPAnd a private key K
GSWherein the public key K
GPExternally public, private key K
GSOnly public security authorities know;
at the same time, all legal citizens A apply for registration of the secret key K bound with the personal identification number to the public security organ
A,K
AIs a key used in the data encryption process and is known only to both citizen A and the public security agency
A;
For the website or mechanism W needing to record the registration information of the real name registration of the user, firstly registering and registering in the public security organization, then verifying the identity authenticity of the website or mechanism W by the public security organization, and distributing the identity ID of the website or mechanism W with the unique identity function by the public security organization after verification
WAnd with the identity ID
WBound key K
W,ID
WThe key K is published externally and can be inquired and verified at the website of the public security institution
WOnly W and public security agencies know;
the real-name registration step is as follows,
in the first step, citizen A visits a website or institution W requiring real-name registration, orVisiting the website of the public security organization to obtain the ID issued by the public security organization
W;
Secondly, the citizen A sends a registration request T of real name registration to the website of the public security organization
A,
Wherein the symbol | | indicates that two adjacent pieces of information are spliced together, ID
AThe ID card number of the citizen A is used as the ID card number of the citizen A, the ID card number E is a data encryption algorithm agreed by the two parties in advance, and the data encryption algorithm E is known by the public;
thirdly, the public security organization receives T
AThen, the ID card number ID of the citizen A is selected from the internal database
ARetrieving a key K associated therewith
AThen use K
AWill be provided with
Decrypting to obtain ID
A||ID
WWherein ID
AIs T
AThen the public security organization finds the identity ID from all the website databases registered in the public security organization
WKey K of
W;
Fourthly, the public security organization generates a real-name registration authentication certificate T for the citizen A,
wherein,
k is a secret key distributed by the public security organization, Time is a timestamp and is used for indicating the application date and the valid Time of T, meanwhile, the Time and the secret key K are bound to be valid, and then the public security organization sends a ciphertext T to a citizen A;
fifthly, after receiving T, citizen A uses the key K mastered by citizen A
ADecrypting T to obtain m
1And
citizen A from m
1To obtain a secret key K distributed by a public security authority and to use its private secret key K by the public security authority
GSSignature result on secret key K
Sixthly, the real-name registration authentication certificate T generated by the public security organization held by the citizen A is registered in the real-name registration of the website or the organization W, firstly, the ciphertext is registered
Sending the result to a website or a mechanism W, then waiting for the website or the mechanism W to confirm the legality of the website or the mechanism W to citizen A,
web site or organization W uses K
WDecryption
Then m is obtained
2From m
2To obtain the public key K used by the public security organization
GPEncrypted user true identity ciphertext
The web site or institution W then uses the public key K of the public security agency
GPWill be provided with
Decrypting to obtain key K distributed by public security organization, randomly generating an integer n with more than four digits by website or organization W, and generating verification code V ═ E
K[n]Then the web site or organization W will
Displaying the real name registration page and the user registration page on the user registration page simultaneously, and waiting for the registration of the real name registration of the user A;
seventhly, citizen A displays the web site or organization W page
Obtained by decrypting T with itself
Comparing and verifying whether the two are consistent, and if the two are consistent, confirming the legality of the website or the mechanism W;
citizen a then uses K to set V ═ E
K[n]Decrypting to obtain n, and filling the registration information selected by the user A at the website or the organization W and the n into a registration page and submitting the registration page;
eighthly, after receiving the registration information of the citizen A, the website or the mechanism W firstly verifies whether the verification code n submitted by the A is correct or not, if the verification code n is correct, the true validity of the identity of the citizen A is confirmed, and then the website or the mechanism W verifies that the identity of the citizen A is true or not
The real name registration information as A is recorded in the website user database together with other registration information, and the citizen A completes the real name registration process.
If the citizen A has illegal behaviors at the website or the organization W, the website or the organization W will execute the illegal behaviors
Informing the public security agency that the public security agency uses the private key K
GSDecryption
The true personal identity of citizen a is obtained.
Preferably, E is a commercial encryption algorithm, such as AES algorithm, or an encryption algorithm specifically designed by public security agencies.
The present invention is described with reference to a specific embodiment of a website or organization W registered with a real name of citizen a, which is described below.
The first step is that the citizen A accesses the website of the public security organization or accesses the website or organization which needs real name registration and registration, here denoted as W, and obtains the ID issued by the public security organization
W;
The second step is that the citizen A sends a real name registration request to the website of the public security organization:
the symbol | | | here denotes the concatenation of two adjacent pieces of information together, ID
AIs ID card number of citizen A, E represents a certain data encryption algorithm agreed by both parties in advance, in this example, E is AES algorithm, K
AIs a key used in the data encryption process and is known only by both a and the public security agency;
third, the public security organization receives T
AThen, the ID card number ID of the citizen A is selected from the internal database
ARetrieving a key K associated therewith
AUsing K
AWill be provided with
Decrypting can obtain the ID
A||ID
WWherein ID
AAs T
AThen finding the ID from all the registered website databases registered in the public security institution
WKey K of
W;
The fourth step public security organ generates a real-name registration authentication voucher for the citizen A:
wherein
The Time is a timestamp used for indicating the application date and the effective Time of the T, and then the ciphertext T is sent to the citizen A, so that the T can be generated in a two-dimensional code mode conveniently;
after receiving T, the fifth step citizen A can use the key K grasped by the citizen A
ADecrypting T to obtain m
1And
citizen A can be selected from m
1To obtain a secret key K distributed by the public security authority and to use its private key K by the public security authority
GSSignature result on secret key K
Since the key K is bound to the timestamp Time, it is only valid the next Time,
is that the public security organization uses the secret key K
WEncrypt the generated ciphertext because A does not know the secret key K
WSo m cannot be decrypted
2;
Sixth step, when the real name registration authentication certificate T generated by the public security organization held by citizen A is registered in the real name registration of the website W, the cipher text is firstly input
And then waiting for the website to firstly confirm the legality of the website W to the website A, and preventing the phishing website and the website which is not authenticated by the public security organization from illegally acquiring the personal information of the user. Since the secret key K is only known to the real web site W
WUsing K
WDecryption
M can then be obtained
2From m
2Can obtain the public key K used by the public security organization
GPEncrypted user true identity ciphertext
Because the website W does not know the private key K of the public security organization
GSSo that it cannot decrypt
The real ID number ID of the A cannot be known
A. Public key K of public security organization used by website W
GPWill be provided with
The decryption can obtain a secret key K distributed by public security organization, then a random integer n with more than four bits is selected to generate V-E
K[n]As the verification code, will
Displaying the real name registration page and the real name registration page on a user registration page simultaneously, and waiting for the completion of the real name registration of the user A;
seventh step citizen A displays the web site W page
Obtained by decrypting T with itself
The comparison and verification are carried out, because anyone except the public security organization cannot forge the signature
Therefore, if the two are consistent, the website W is a legal website authenticated by the public security organization, so that the website firstly verifies the validity of the website to the citizen a. Since a already obtained K in the fifth step, a uses K to convert V to E
K[n]Decrypting to obtain n, and A filling the registration information selected by the user at the website W and the n on a registration page together to click and submit;
eighth step, after receiving registration information of citizen a, website W first verifies whether verification code n submitted by a is correct, since only real citizen a can decrypt V ═ E using secret key K in fourth step
K[n]Therefore, citizen A verifies the real legality of self identity to website W, and W will
The real name registration information as A and other registration information are recorded in a website user database, and the citizen A finishes the real name registration process;
ninth, if the citizen A has illegal behavior at the site W, W only needs to be matched
Informing the public security authority that the public security authority uses the private key K which is only mastered by the public security authority itself
GSDecryption
The true personal identity of citizen a can be obtained.
The technology realized by the invention effectively protects the respective information safety through the identity authentication between the website and the real-name registration user, and simultaneously provides convenience for the intervention investigation of public security organs at necessary time.
Although the preferred embodiments of the present invention have been described in detail, the present invention is not limited to the details of the embodiments, and various equivalent modifications can be made within the technical spirit of the present invention, and the scope of the present invention is also within the scope of the present invention.
It should be noted that, in the above embodiments, the various features described in the above embodiments may be replaced or combined in any suitable manner without departing from the scope of the present invention. The invention is not described in detail in order to avoid unnecessary repetition.
Claims (4)
1. A secure network real name registration method is characterized in that,
the method introduces a national public security agency with authoritative public trust, and the public security agency masters the detailed personal identity information of all legal citizens in the country and has a public key K
GPAnd a private key K
GSWherein the public key K
GPExternally public, private key K
GSOnly public security authorities know;
at the same time, all legal citizens A apply for registration of the secret key K bound with the personal identification number to the public security organ
A,K
AIs a key used in the data encryption process and is known only to both citizen A and the public security agency
A;
For the website or mechanism W needing to record the registration information of the real name registration of the user, firstly registering and registering in the public security organization, then verifying the identity authenticity of the website or mechanism W by the public security organization, and distributing the identity ID of the website or mechanism W with the unique identity function by the public security organization after verification
WAnd with the identity ID
WBound key K
W,ID
WThe key K is published externally and can be inquired and verified at the website of the public security institution
WOnly W and public security agencies know;
the real-name registration step is as follows,
firstly, a citizen A accesses a website or a mechanism W which needs real-name registration or accesses a website of a public security organization to acquire an identification ID issued by the public security organization
W;
Secondly, the citizen A sends a registration request T of real name registration to the website of the public security organization
A,
Wherein the symbol | | indicates that two adjacent pieces of information are spliced together, ID
AThe ID card number of the citizen A is used as the ID card number of the citizen A, the ID card number E is a data encryption algorithm agreed by the two parties in advance, and the data encryption algorithm E is known by the public;
thirdly, the public security organization receives T
AThen, the ID card number ID of the citizen A is selected from the internal database
ARetrieving a key K associated therewith
AThen use K
AWill be provided with
Decrypting to obtain ID
A‖ID
WWherein ID
AIs T
AThen the public security organization finds the identity ID from all the website databases registered in the public security organization
WKey K of
W;
Fourthly, the public security organization generates a real-name registration authentication certificate T for the citizen A,
wherein,
k isThe Time is a timestamp and is used for indicating the application date and the valid Time of the T, and meanwhile, the Time and the key K are bound to be valid at the same Time, and then the public security organization sends the authentication certificate T to the citizen A;
fifthly, after receiving T, citizen A uses the key K mastered by citizen A
ADecrypting T to obtain m
1And
citizen A from m
1To obtain a secret key K distributed by a public security authority and to use its private secret key K by the public security authority
GSSignature result on secret key K
Sixthly, the real-name registration authentication certificate T generated by the public security organization held by the citizen A is registered in the real-name registration of the website or the organization W, firstly, the ciphertext is registered
Sending the result to a website or a mechanism W, then waiting for the website or the mechanism W to confirm the legality of the website or the mechanism W to citizen A,
web site or organization W uses K
WDecryption
Then m is obtained
2From m
2To obtain the public key K used by the public security organization
GPEncrypted user true identity ciphertext
The web site or institution W then uses the public key K of the public security agency
GPWill be provided with
Decrypting to obtain key K distributed by public security organization, randomly generating an integer n with more than four digits by website or organization W, and generating verification code V ═ E
K[n]Then the web site or organization W will
Displaying the real name registration page and the real name registration page on a user registration page simultaneously, and waiting for the completion of the real name registration of the user A;
seventhly, citizen A displays the web site or organization W page
Obtained by decrypting T with itself
Comparing and verifying whether the two are consistent, and if the two are consistent, confirming the legality of the website or the mechanism W;
citizen a then uses K to set V ═ E
K[n]Decrypting to obtain n, and filling the registration information selected by the user A at the website or the organization W and the n into a registration page and submitting the registration page;
eighthly, after receiving the registration information of the citizen A, the website or the mechanism W firstly verifies whether the verification code n submitted by the A is correct or not, if the verification code n is correct, the true validity of the identity of the citizen A is confirmed, and then the website or the mechanism W verifies that the identity of the citizen A is true or not
The real name registration information as A is recorded in the website user database together with other registration information, and the citizen A completes the real name registration process.
2. The method of claim 1, wherein if the citizen A has illegal activity at the website or organization W, the website or organization W will execute the illegal activity
Informing the public security agency that the public security agency uses the private key K
GSDecryption
Obtaining trueness of citizen AThe identity of the individual.
3. Method according to claim 1 or 2, characterized in that the encryption algorithm E is the AES algorithm.
4. The method of claim 3, wherein T is generated as a two-dimensional code.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710538924.0A CN107196965B (en) | 2017-07-04 | 2017-07-04 | Secure network real name registration method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710538924.0A CN107196965B (en) | 2017-07-04 | 2017-07-04 | Secure network real name registration method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107196965A CN107196965A (en) | 2017-09-22 |
CN107196965B true CN107196965B (en) | 2020-02-11 |
Family
ID=59881794
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710538924.0A Active CN107196965B (en) | 2017-07-04 | 2017-07-04 | Secure network real name registration method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107196965B (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108696508A (en) * | 2018-04-11 | 2018-10-23 | 于志 | System and method based on CN39 code authentication resident identification card numbers |
CN108959883B (en) * | 2018-06-25 | 2021-07-09 | 兴唐通信科技有限公司 | Network identity real-name authentication method based on quick response matrix code |
CN112733096B (en) * | 2019-10-14 | 2024-02-27 | 深圳市红砖坊技术有限公司 | User registration method, user login method and corresponding device |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2005017645A2 (en) * | 2003-08-14 | 2005-02-24 | Jay-Yeob Hwang | Method of service to authenticate the person himself |
WO2013150147A1 (en) * | 2012-04-05 | 2013-10-10 | Dunbridge Limited | Authentication in computer networks |
CN103401686A (en) * | 2013-07-31 | 2013-11-20 | 陕西海基业高科技实业有限公司 | User Internet identity authentication system and application method thereof |
CN104683306A (en) * | 2013-12-03 | 2015-06-03 | 中国人民公安大学 | Safe and controllable internet real-name certification mechanism |
CN104683307A (en) * | 2013-12-03 | 2015-06-03 | 中国人民公安大学 | Internet real-name authentication method based on temporary certificate |
CN105681047A (en) * | 2016-03-25 | 2016-06-15 | 中国互联网络信息中心 | CA certificate issuance method and system |
CN106850693A (en) * | 2017-03-31 | 2017-06-13 | 深圳微众税银信息服务有限公司 | The method and real-name authentication system of a kind of real-name authentication |
-
2017
- 2017-07-04 CN CN201710538924.0A patent/CN107196965B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2005017645A2 (en) * | 2003-08-14 | 2005-02-24 | Jay-Yeob Hwang | Method of service to authenticate the person himself |
WO2013150147A1 (en) * | 2012-04-05 | 2013-10-10 | Dunbridge Limited | Authentication in computer networks |
CN103401686A (en) * | 2013-07-31 | 2013-11-20 | 陕西海基业高科技实业有限公司 | User Internet identity authentication system and application method thereof |
CN104683306A (en) * | 2013-12-03 | 2015-06-03 | 中国人民公安大学 | Safe and controllable internet real-name certification mechanism |
CN104683307A (en) * | 2013-12-03 | 2015-06-03 | 中国人民公安大学 | Internet real-name authentication method based on temporary certificate |
CN105681047A (en) * | 2016-03-25 | 2016-06-15 | 中国互联网络信息中心 | CA certificate issuance method and system |
CN106850693A (en) * | 2017-03-31 | 2017-06-13 | 深圳微众税银信息服务有限公司 | The method and real-name authentication system of a kind of real-name authentication |
Non-Patent Citations (1)
Title |
---|
网络实名制的隐私保护研究;程琳;《信息安全与通信保密》;20131110;第1-5页 * |
Also Published As
Publication number | Publication date |
---|---|
CN107196965A (en) | 2017-09-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10979418B2 (en) | Template-based distributed certificate issuance in a multi-tenant environment | |
CN107566116B (en) | Method and apparatus for digital asset weight registration | |
US11100743B1 (en) | Blockchain-based election system | |
CN110874464A (en) | Method and equipment for managing user identity authentication data | |
JP4625234B2 (en) | User certificate / private key assignment in token-enabled public key infrastructure system | |
JP6543040B2 (en) | System and method for remote access, remote digital signature | |
US20170147808A1 (en) | Tokens for multi-tenant transaction database identity, attribute and reputation management | |
CN107196966A (en) | The identity identifying method and system of multi-party trust based on block chain | |
AU2007286004B2 (en) | Compliance assessment reporting service | |
CN109039655A (en) | Real name identity identifying method and device, identity block chain based on block chain | |
CN108684041A (en) | The system and method for login authentication | |
CN106230784A (en) | A kind of device authentication method and device | |
Symeonidis et al. | Keyless car sharing system: A security and privacy analysis | |
JP2003234729A (en) | Revocation and updating of token in public key infrastructure system | |
CN112733121B (en) | Data acquisition method, device, equipment and storage medium | |
CN106936588A (en) | A kind of trustship method, the apparatus and system of hardware controls lock | |
CN102769623A (en) | Two-factor authentication method based on digital certificate and biological identification information | |
CN107196965B (en) | Secure network real name registration method | |
CN111444492A (en) | Digital identity verification method based on medical block chain | |
Guo et al. | Using blockchain to control access to cloud data | |
CN115396096A (en) | Encryption and decryption method and protection system for secret file based on national cryptographic algorithm | |
CN113158250B (en) | Privacy protection network car booking method and system for eliminating once-matched drivers | |
CN113783690B (en) | Authentication-based bidding method and device | |
Al-Rawy et al. | A design for blockchain-based digital voting system | |
KR20080012641A (en) | The security method for authentication by substitutive symbol of the residence registration number in internet environment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |